跳转到帖子

Amazon Linux 2023: CVE-2024-33655: Important priority package update for unbound

recommended_posts

发布于
  • Members

Amazon Linux 2023: CVE-2024-33655: Important priority package update for unbound

Severity
3
CVSS
(AV:N/AC:H/Au:N/C:N/I:N/A:P)
Published
05/09/2024
Created
02/14/2025
Added
02/14/2025
Modified
02/14/2025

Description

The DNS protocol in RFC 1035 and updates allows remote attackers to cause a denial of service (resource consumption) by arranging for DNS queries to be accumulated for seconds, such that responses are later sent in a pulsing burst (which can be considered traffic amplification in some cases), aka the "DNSBomb" issue. A DNSBomb flaw was found in the unbound package. The DNSBomb attack works by sending low-rate spoofed queries for a malicious zone to Unbound. By controlling the delay of the malicious authoritative answers, Unbound slowly accumulates pending answers for the spoofed addresses. When the authoritative answers become available to Unbound at the same time, Unbound starts serving all the accumulated queries. This results in large-sized, concentrated response bursts to the spoofed addresses.

Solution(s)

  • amazon-linux-2023-upgrade-python3-unbound
  • amazon-linux-2023-upgrade-python3-unbound-debuginfo
  • amazon-linux-2023-upgrade-unbound
  • amazon-linux-2023-upgrade-unbound-anchor
  • amazon-linux-2023-upgrade-unbound-anchor-debuginfo
  • amazon-linux-2023-upgrade-unbound-debuginfo
  • amazon-linux-2023-upgrade-unbound-debugsource
  • amazon-linux-2023-upgrade-unbound-devel
  • amazon-linux-2023-upgrade-unbound-libs
  • amazon-linux-2023-upgrade-unbound-libs-debuginfo
  • amazon-linux-2023-upgrade-unbound-utils
  • amazon-linux-2023-upgrade-unbound-utils-debuginfo

References

  • https://attackerkb.com/topics/cve-2024-33655
  • CVE - 2024-33655
  • https://alas.aws.amazon.com/AL2023/ALAS-2024-610.html
  • 查看数 696
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。
注意:你的帖子需要版主批准后才能看到。

游客
回帖…