Cz.Nic Knot-Resolver vulnerabilities
13 known vulnerabilities affecting cz.nic/knot-resolver.
Total CVEs
13
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
HIGH11MEDIUM1LOW1
Vulnerabilities
Page 1 of 1
CVE-2023-50868HIGHCVSS 7.5≥ 0, < 5.6.0-1+deb12u1≥ 0, < 5.7.1-12024-02-14
CVE-2023-50868 [HIGH] CVE-2023-50868: The Closest Encloser Proof aspect of the DNS protocol (in RFC 5155 when RFC 9276 guidance is skipped) allows remote attackers to cause a denial of ser
The Closest Encloser Proof aspect of the DNS protocol (in RFC 5155 when RFC 9276 guidance is skipped) allows remote attackers to cause a denial of service (CPU consumption for SHA-1 computations) via DNSSEC responses in a random subdomain attack, aka the "NSEC3" issue. The RFC 5155 specification implies that a
osv
CVE-2023-50387HIGHCVSS 7.5≥ 0, < 5.6.0-1+deb12u1≥ 0, < 5.7.1-12024-02-14
CVE-2023-50387 [HIGH] CVE-2023-50387: Certain DNSSEC aspects of the DNS protocol (in RFC 4033, 4034, 4035, 6840, and related RFCs) allow remote attackers to cause a denial of service (CPU
Certain DNSSEC aspects of the DNS protocol (in RFC 4033, 4034, 4035, 6840, and related RFCs) allow remote attackers to cause a denial of service (CPU consumption) via one or more DNSSEC responses, aka the "KeyTrap" issue. One of the concerns is that, when there is a zone with many DNSKEY and RRSIG records, the
osv
CVE-2023-46317HIGHCVSS 7.5≥ 0, < 5.6.0-1+deb12u1≥ 0, < 5.7.0-12023-10-22
CVE-2023-46317 [HIGH] CVE-2023-46317: Knot Resolver before 5
Knot Resolver before 5.7.0 performs many TCP reconnections upon receiving certain nonsensical responses from servers.
osv
CVE-2023-26249HIGHCVSS 7.5≥ 0, < 5.6.0-12023-02-21
CVE-2023-26249 [HIGH] CVE-2023-26249: Knot Resolver before 5
Knot Resolver before 5.6.0 enables attackers to consume its resources, launching amplification attacks and potentially causing a denial of service. Specifically, a single client query may lead to a hundred TCP connection attempts if a DNS server closes connections without providing a response.
osv
CVE-2022-40188HIGHCVSS 7.5≥ 0, < 5.5.3-12022-09-23
CVE-2022-40188 [HIGH] CVE-2022-40188: Knot Resolver before 5
Knot Resolver before 5.5.3 allows remote attackers to cause a denial of service (CPU consumption) because of algorithmic complexity. During an attack, an authoritative server must return large NS sets or address sets.
osv
CVE-2021-40083HIGHCVSS 7.5≥ 0, < 5.3.1-1+deb11u1≥ 0, < 5.4.1-22021-08-25
CVE-2021-40083 [HIGH] CVE-2021-40083: Knot Resolver before 5
Knot Resolver before 5.3.2 is prone to an assertion failure, triggerable by a remote attacker in an edge case (NSEC3 with too many iterations used for a positive wildcard proof).
osv
CVE-2018-1110HIGHCVSS 7.5vKnot Resolver 2.3.02021-03-30
CVE-2018-1110 [HIGH] CWE-20 CVE-2018-1110: A flaw was found in knot-resolver before version 2
A flaw was found in knot-resolver before version 2.3.0. Malformed DNS messages may cause denial of service.
cvelistv5osv
CVE-2020-12667HIGHCVSS 7.5≥ 0, < 5.1.1-0.12020-05-19
CVE-2020-12667 [HIGH] CVE-2020-12667: Knot Resolver before 5
Knot Resolver before 5.1.1 allows traffic amplification via a crafted DNS answer from an attacker-controlled server, aka an "NXNSAttack" issue. This is triggered by random subdomains in the NSDNAME in NS records.
osv
CVE-2019-19331HIGHCVSS 7.5v4.3.02019-12-16
CVE-2019-19331 [HIGH] CWE-407 CVE-2019-19331: knot-resolver before version 4.3.0 is vulnerable to denial of service through high CPU utilization.
knot-resolver before version 4.3.0 is vulnerable to denial of service through high CPU utilization. DNS replies with very many resource records might be processed very inefficiently, in extreme cases taking even several CPU seconds for each such uncached message. For example, a few thousand A records can be squashed into one DNS message (limit is 64kB)
cvelistv5nvdosv
CVE-2019-10190HIGHCVSS 7.5vfrom 3.2.0 before 4.1.02019-07-16
CVE-2019-10190 [HIGH] CWE-20 CVE-2019-10190: A vulnerability was discovered in DNS resolver component of knot resolver through version 3.2.0 befo
A vulnerability was discovered in DNS resolver component of knot resolver through version 3.2.0 before 4.1.0 which allows remote attackers to bypass DNSSEC validation for non-existence answer. NXDOMAIN answer would get passed through to the client even if its DNSSEC validation failed, instead of sending a SERVFAIL packet. Caching is not affected by thi
cvelistv5nvdosv
CVE-2019-10191HIGHCVSS 7.5vall before 4.1.02019-07-16
CVE-2019-10191 [HIGH] CWE-20 CVE-2019-10191: A vulnerability was discovered in DNS resolver of knot resolver before version 4.1.0 which allows re
A vulnerability was discovered in DNS resolver of knot resolver before version 4.1.0 which allows remote attackers to downgrade DNSSEC-secure domains to DNSSEC-insecure state, opening possibility of domain hijack using attacks against insecure DNS protocol.
cvelistv5nvdosv
CVE-2018-10920MEDIUMCVSS 6.8vbefore 2.4.12018-08-02
CVE-2018-10920 [MEDIUM] CWE-20 CVE-2018-10920: Improper input validation bug in DNS resolver component of Knot Resolver before 2.4.1 allows remote
Improper input validation bug in DNS resolver component of Knot Resolver before 2.4.1 allows remote attacker to poison cache.
cvelistv5nvdosv
CVE-2018-1000002LOWCVSS 3.7≥ 0, < 1.5.2-12018-01-22
CVE-2018-1000002 [LOW] CVE-2018-1000002: Improper input validation bugs in DNSSEC validators components in Knot Resolver (prior version 1
Improper input validation bugs in DNSSEC validators components in Knot Resolver (prior version 1.5.2) allow attacker in man-in-the-middle position to deny existence of some data in DNS via packet replay.
osv