Knot Resolver before 5.5.3 allows remote attackers to cause a denial of service (CPU consumption) because of algorithmic complexity. During an attack, an authoritative server must return large NS sets or address sets.
An algorithm in a product has an inefficient worst-case computational complexity that may be detrimental to system performance and can be triggered by an attacker, typically using crafted manipulations that ensure that the worst case is being reached.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Knot_resolver | Nic | * | 5.5.3 (excluding) |
Knot-resolver | Ubuntu | bionic | * |
Knot-resolver | Ubuntu | esm-apps/bionic | * |
Knot-resolver | Ubuntu | esm-apps/jammy | * |
Knot-resolver | Ubuntu | esm-apps/xenial | * |
Knot-resolver | Ubuntu | focal | * |
Knot-resolver | Ubuntu | jammy | * |
Knot-resolver | Ubuntu | kinetic | * |
Knot-resolver | Ubuntu | trusty | * |
Knot-resolver | Ubuntu | upstream | * |
Knot-resolver | Ubuntu | xenial | * |