Show filters
5 Total Results
Displaying 1-5 of 5
Sort by:
Attacker Value
Unknown
CVE-2024-2169
Disclosure Date: March 19, 2024 (last updated April 01, 2024)
Implementations of UDP application protocol are vulnerable to network loops. An unauthenticated attacker can use maliciously-crafted packets against a vulnerable implementation that can lead to Denial of Service (DOS) and/or abuse of resources.
0
Attacker Value
Unknown
CVE-2022-33991
Disclosure Date: August 15, 2022 (last updated October 08, 2023)
dproxy-nexgen (aka dproxy nexgen) forwards and caches DNS queries with the CD (aka checking disabled) bit set to 1. This leads to disabling of DNSSEC protection provided by upstream resolvers.
0
Attacker Value
Unknown
CVE-2022-33990
Disclosure Date: August 15, 2022 (last updated October 08, 2023)
Misinterpretation of special domain name characters in dproxy-nexgen (aka dproxy nexgen) leads to cache poisoning because domain names and their associated IP addresses are cached in their misinterpreted form.
0
Attacker Value
Unknown
CVE-2022-33989
Disclosure Date: August 15, 2022 (last updated October 08, 2023)
dproxy-nexgen (aka dproxy nexgen) uses a static UDP source port (selected randomly only at boot time) in upstream queries sent to DNS resolvers. This allows DNS cache poisoning because there is not enough entropy to prevent traffic injection attacks.
0
Attacker Value
Unknown
CVE-2022-33988
Disclosure Date: August 15, 2022 (last updated October 08, 2023)
dproxy-nexgen (aka dproxy nexgen) re-uses the DNS transaction id (TXID) value from client queries, which allows attackers (able to send queries to the resolver) to conduct DNS cache-poisoning attacks because the TXID value is known to the attacker.
0