The DNS protocol in RFC 1035 and updates allows remote attackers to cause a denial of service (resource consumption) by arranging for DNS queries to be accumulated for seconds, such that responses are later sent in a pulsing burst (which can be considered traffic amplification in some cases), aka the "DNSBomb" issue.
Metrics
Affected Vendors & Products
References
History
Mon, 03 Nov 2025 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Mon, 03 Nov 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Technitium
Technitium dns Server |
|
| CPEs | cpe:2.3:a:technitium:dns_server:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Technitium
Technitium dns Server |
|
| Metrics |
ssvc
|
Thu, 22 Aug 2024 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
cvssV3_1
|
Status: PUBLISHED
Assigner: mitre
Published: 2024-06-06T00:00:00.000Z
Updated: 2025-11-03T18:08:21.723Z
Reserved: 2024-04-25T00:00:00.000Z
Link: CVE-2024-33655
Updated: 2025-11-03T18:08:21.723Z
Status : Awaiting Analysis
Published: 2024-06-06T17:15:51.040
Modified: 2025-11-03T19:15:43.927
Link: CVE-2024-33655