Search for packages
| purl | pkg:deb/debian/knot-resolver@5.3.1-1%2Bdeb11u1 |
| Next non-vulnerable version | 5.6.0-1+deb12u1 |
| Latest non-vulnerable version | 5.6.0-1+deb12u1 |
| Risk | 3.4 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-66sa-bc5p-jqde
Aliases: CVE-2023-50387 |
Multiple vulnerabilities have been discovered in Dnsmasq, the worst of which could lead to a denial of service. |
Affected by 0 other vulnerabilities. |
|
VCID-c7c5-awxv-j3de
Aliases: CVE-2022-40188 |
Knot Resolver before 5.5.3 allows remote attackers to cause a denial of service (CPU consumption) because of algorithmic complexity. During an attack, an authoritative server must return large NS sets or address sets. |
Affected by 0 other vulnerabilities. |
|
VCID-efrw-bm7j-6qgz
Aliases: CVE-2023-46317 |
Knot Resolver before 5.7.0 performs many TCP reconnections upon receiving certain nonsensical responses from servers. |
Affected by 0 other vulnerabilities. |
|
VCID-ps4g-f1q9-wqhm
Aliases: CVE-2023-26249 |
Knot Resolver before 5.6.0 enables attackers to consume its resources, launching amplification attacks and potentially causing a denial of service. Specifically, a single client query may lead to a hundred TCP connection attempts if a DNS server closes connections without providing a response. |
Affected by 0 other vulnerabilities. |
|
VCID-vprj-j7u6-zbe7
Aliases: CVE-2023-50868 |
Multiple vulnerabilities have been discovered in Dnsmasq, the worst of which could lead to a denial of service. |
Affected by 0 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-2wu3-v2hz-q3bv | Knot Resolver before 5.1.1 allows traffic amplification via a crafted DNS answer from an attacker-controlled server, aka an "NXNSAttack" issue. This is triggered by random subdomains in the NSDNAME in NS records. |
CVE-2020-12667
|
| VCID-8ks2-kv5d-gkdc | knot-resolver before version 4.3.0 is vulnerable to denial of service through high CPU utilization. DNS replies with very many resource records might be processed very inefficiently, in extreme cases taking even several CPU seconds for each such uncached message. For example, a few thousand A records can be squashed into one DNS message (limit is 64kB). |
CVE-2019-19331
|
| VCID-fptj-ztkq-7uag | A vulnerability was discovered in DNS resolver of knot resolver before version 4.1.0 which allows remote attackers to downgrade DNSSEC-secure domains to DNSSEC-insecure state, opening possibility of domain hijack using attacks against insecure DNS protocol. |
CVE-2019-10191
|
| VCID-g2wb-bccm-ufhn | A vulnerability was discovered in DNS resolver component of knot resolver through version 3.2.0 before 4.1.0 which allows remote attackers to bypass DNSSEC validation for non-existence answer. NXDOMAIN answer would get passed through to the client even if its DNSSEC validation failed, instead of sending a SERVFAIL packet. Caching is not affected by this particular bug but see CVE-2019-10191. |
CVE-2019-10190
|
| VCID-ne61-utfg-8bgx | Knot Resolver before 5.3.2 is prone to an assertion failure, triggerable by a remote attacker in an edge case (NSEC3 with too many iterations used for a positive wildcard proof). |
CVE-2021-40083
|