Количество 17
Количество 17
CVE-2024-8508
NLnet Labs Unbound up to and including version 1.21.0 contains a vulnerability when handling replies with very large RRsets that it needs to perform name compression for. Malicious upstreams responses with very large RRsets can cause Unbound to spend a considerable time applying name compression to downstream replies. This can lead to degraded performance and eventually denial of service in well orchestrated attacks. The vulnerability can be exploited by a malicious actor querying Unbound for the specially crafted contents of a malicious zone with very large RRsets. Before Unbound replies to the query it will try to apply name compression which was an unbounded operation that could lock the CPU until the whole packet was complete. Unbound version 1.21.1 introduces a hard limit on the number of name compression calculations it is willing to do per packet. Packets that need more compression will result in semi-compressed packets or truncated packets, even on TCP for huge messages, to ...
CVE-2024-8508
NLnet Labs Unbound up to and including version 1.21.0 contains a vulnerability when handling replies with very large RRsets that it needs to perform name compression for. Malicious upstreams responses with very large RRsets can cause Unbound to spend a considerable time applying name compression to downstream replies. This can lead to degraded performance and eventually denial of service in well orchestrated attacks. The vulnerability can be exploited by a malicious actor querying Unbound for the specially crafted contents of a malicious zone with very large RRsets. Before Unbound replies to the query it will try to apply name compression which was an unbounded operation that could lock the CPU until the whole packet was complete. Unbound version 1.21.1 introduces a hard limit on the number of name compression calculations it is willing to do per packet. Packets that need more compression will result in semi-compressed packets or truncated packets, even on TCP for huge messages, to ...
CVE-2024-8508
NLnet Labs Unbound up to and including version 1.21.0 contains a vulnerability when handling replies with very large RRsets that it needs to perform name compression for. Malicious upstreams responses with very large RRsets can cause Unbound to spend a considerable time applying name compression to downstream replies. This can lead to degraded performance and eventually denial of service in well orchestrated attacks. The vulnerability can be exploited by a malicious actor querying Unbound for the specially crafted contents of a malicious zone with very large RRsets. Before Unbound replies to the query it will try to apply name compression which was an unbounded operation that could lock the CPU until the whole packet was complete. Unbound version 1.21.1 introduces a hard limit on the number of name compression calculations it is willing to do per packet. Packets that need more compression will result in semi-compressed packets or truncated packets, even on TCP for huge messages, to avo
CVE-2024-8508
Unbounded name compression could lead to Denial of Service
CVE-2024-8508
NLnet Labs Unbound up to and including version 1.21.0 contains a vulne ...
SUSE-SU-2024:3647-1
Security update for unbound
SUSE-SU-2024:3646-1
Security update for unbound
ROS-20250922-09
Уязвимость unbound
RLSA-2025:8047
Moderate: unbound security update
RLSA-2024:11232
Moderate: unbound:1.16.2 security update
GHSA-g7cv-x9wx-38gx
NLnet Labs Unbound up to and including version 1.21.0 contains a vulnerability when handling replies with very large RRsets that it needs to perform name compression for. Malicious upstreams responses with very large RRsets can cause Unbound to spend a considerable time applying name compression to downstream replies. This can lead to degraded performance and eventually denial of service in well orchestrated attacks. The vulnerability can be exploited by a malicious actor querying Unbound for the specially crafted contents of a malicious zone with very large RRsets. Before Unbound replies to the query it will try to apply name compression which was an unbounded operation that could lock the CPU until the whole packet was complete. Unbound version 1.21.1 introduces a hard limit on the number of name compression calculations it is willing to do per packet. Packets that need more compression will result in semi-compressed packets or truncated packets, even on TCP for huge messages, to ...
ELSA-2025-8197
ELSA-2025-8197: unbound security update (MODERATE)
ELSA-2025-8047
ELSA-2025-8047: unbound security update (MODERATE)
ELSA-2024-11232
ELSA-2024-11232: unbound:1.16.2 security update (MODERATE)
BDU:2025-11496
Уязвимость DNS-сервера Unbound, связанная с неконтролируемым расходом ресурсов, позволяющая нарушителю вызвать отказ в обслуживании
RLSA-2025:0837
Important: unbound security update
ELSA-2025-0837
ELSA-2025-0837: unbound security update (IMPORTANT)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2024-8508 NLnet Labs Unbound up to and including version 1.21.0 contains a vulnerability when handling replies with very large RRsets that it needs to perform name compression for. Malicious upstreams responses with very large RRsets can cause Unbound to spend a considerable time applying name compression to downstream replies. This can lead to degraded performance and eventually denial of service in well orchestrated attacks. The vulnerability can be exploited by a malicious actor querying Unbound for the specially crafted contents of a malicious zone with very large RRsets. Before Unbound replies to the query it will try to apply name compression which was an unbounded operation that could lock the CPU until the whole packet was complete. Unbound version 1.21.1 introduces a hard limit on the number of name compression calculations it is willing to do per packet. Packets that need more compression will result in semi-compressed packets or truncated packets, even on TCP for huge messages, to ... | CVSS3: 5.3 | 1% Низкий | около 1 года назад | |
CVE-2024-8508 NLnet Labs Unbound up to and including version 1.21.0 contains a vulnerability when handling replies with very large RRsets that it needs to perform name compression for. Malicious upstreams responses with very large RRsets can cause Unbound to spend a considerable time applying name compression to downstream replies. This can lead to degraded performance and eventually denial of service in well orchestrated attacks. The vulnerability can be exploited by a malicious actor querying Unbound for the specially crafted contents of a malicious zone with very large RRsets. Before Unbound replies to the query it will try to apply name compression which was an unbounded operation that could lock the CPU until the whole packet was complete. Unbound version 1.21.1 introduces a hard limit on the number of name compression calculations it is willing to do per packet. Packets that need more compression will result in semi-compressed packets or truncated packets, even on TCP for huge messages, to ... | CVSS3: 5.3 | 1% Низкий | около 1 года назад | |
CVE-2024-8508 NLnet Labs Unbound up to and including version 1.21.0 contains a vulnerability when handling replies with very large RRsets that it needs to perform name compression for. Malicious upstreams responses with very large RRsets can cause Unbound to spend a considerable time applying name compression to downstream replies. This can lead to degraded performance and eventually denial of service in well orchestrated attacks. The vulnerability can be exploited by a malicious actor querying Unbound for the specially crafted contents of a malicious zone with very large RRsets. Before Unbound replies to the query it will try to apply name compression which was an unbounded operation that could lock the CPU until the whole packet was complete. Unbound version 1.21.1 introduces a hard limit on the number of name compression calculations it is willing to do per packet. Packets that need more compression will result in semi-compressed packets or truncated packets, even on TCP for huge messages, to avo | CVSS3: 5.3 | 1% Низкий | около 1 года назад | |
CVE-2024-8508 Unbounded name compression could lead to Denial of Service | CVSS3: 5.3 | 1% Низкий | 12 месяцев назад | |
CVE-2024-8508 NLnet Labs Unbound up to and including version 1.21.0 contains a vulne ... | CVSS3: 5.3 | 1% Низкий | около 1 года назад | |
SUSE-SU-2024:3647-1 Security update for unbound | 1% Низкий | около 1 года назад | ||
SUSE-SU-2024:3646-1 Security update for unbound | 1% Низкий | около 1 года назад | ||
ROS-20250922-09 Уязвимость unbound | CVSS3: 5.3 | 1% Низкий | около 1 месяца назад | |
RLSA-2025:8047 Moderate: unbound security update | 1% Низкий | около 1 месяца назад | ||
RLSA-2024:11232 Moderate: unbound:1.16.2 security update | 1% Низкий | 8 месяцев назад | ||
GHSA-g7cv-x9wx-38gx NLnet Labs Unbound up to and including version 1.21.0 contains a vulnerability when handling replies with very large RRsets that it needs to perform name compression for. Malicious upstreams responses with very large RRsets can cause Unbound to spend a considerable time applying name compression to downstream replies. This can lead to degraded performance and eventually denial of service in well orchestrated attacks. The vulnerability can be exploited by a malicious actor querying Unbound for the specially crafted contents of a malicious zone with very large RRsets. Before Unbound replies to the query it will try to apply name compression which was an unbounded operation that could lock the CPU until the whole packet was complete. Unbound version 1.21.1 introduces a hard limit on the number of name compression calculations it is willing to do per packet. Packets that need more compression will result in semi-compressed packets or truncated packets, even on TCP for huge messages, to ... | CVSS3: 5.3 | 1% Низкий | около 1 года назад | |
ELSA-2025-8197 ELSA-2025-8197: unbound security update (MODERATE) | 5 месяцев назад | |||
ELSA-2025-8047 ELSA-2025-8047: unbound security update (MODERATE) | 4 месяца назад | |||
ELSA-2024-11232 ELSA-2024-11232: unbound:1.16.2 security update (MODERATE) | 11 месяцев назад | |||
BDU:2025-11496 Уязвимость DNS-сервера Unbound, связанная с неконтролируемым расходом ресурсов, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 5.3 | 1% Низкий | около 1 года назад | |
RLSA-2025:0837 Important: unbound security update | 9 месяцев назад | |||
ELSA-2025-0837 ELSA-2025-0837: unbound security update (IMPORTANT) | 9 месяцев назад |
Уязвимостей на страницу