CVE-2023-28452

An issue was discovered in CoreDNS through 1.10.1. There is a vulnerability in DNS resolving software, which triggers a resolver to ignore valid responses, thus causing denial of service for normal resolution. In an exploit, the attacker could just forge a response targeting the source port of a vulnerable resolver without the need to guess the correct TXID.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:coredns.io:coredns:*:*:*:*:*:*:*:*

History

26 Sep 2024, 18:37

Type Values Removed Values Added
First Time Coredns.io
Coredns.io coredns
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
CPE cpe:2.3:a:coredns.io:coredns:*:*:*:*:*:*:*:*
References () https://coredns.io/ - () https://coredns.io/ - Product
References () https://gist.github.com/idealeer/e41c7fb3b661d4262d0b6f21e12168ba - () https://gist.github.com/idealeer/e41c7fb3b661d4262d0b6f21e12168ba - Third Party Advisory
CWE NVD-CWE-noinfo

18 Sep 2024, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-09-18 15:15

Updated : 2025-03-19 21:15


NVD link : CVE-2023-28452

Mitre link : CVE-2023-28452


JSON object : View

Products Affected

coredns.io

  • coredns