Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-19331

Опубликовано: 16 дек. 2019
Источник: debian
EPSS Низкий

Описание

knot-resolver before version 4.3.0 is vulnerable to denial of service through high CPU utilization. DNS replies with very many resource records might be processed very inefficiently, in extreme cases taking even several CPU seconds for each such uncached message. For example, a few thousand A records can be squashed into one DNS message (limit is 64kB).

Пакеты

ПакетСтатусВерсия исправленияРелизТип
knot-resolverfixed5.0.1-1package

Примечания

  • https://www.openwall.com/lists/oss-security/2019/12/04/4

EPSS

Процентиль: 54%
0.00312
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
около 6 лет назад

knot-resolver before version 4.3.0 is vulnerable to denial of service through high CPU utilization. DNS replies with very many resource records might be processed very inefficiently, in extreme cases taking even several CPU seconds for each such uncached message. For example, a few thousand A records can be squashed into one DNS message (limit is 64kB).

CVSS3: 7.5
nvd
около 6 лет назад

knot-resolver before version 4.3.0 is vulnerable to denial of service through high CPU utilization. DNS replies with very many resource records might be processed very inefficiently, in extreme cases taking even several CPU seconds for each such uncached message. For example, a few thousand A records can be squashed into one DNS message (limit is 64kB).

CVSS3: 7.5
github
больше 3 лет назад

knot-resolver before version 4.3.0 is vulnerable to denial of service through high CPU utilization. DNS replies with very many resource records might be processed very inefficiently, in extreme cases taking even several CPU seconds for each such uncached message. For example, a few thousand A records can be squashed into one DNS message (limit is 64kB).

EPSS

Процентиль: 54%
0.00312
Низкий