Upstream information

CVE-2023-28452 at MITRE

Description

An issue was discovered in CoreDNS through 1.10.1. There is a vulnerability in DNS resolving software, which triggers a resolver to ignore valid responses, thus causing denial of service for normal resolution. In an exploit, the attacker could just forge a response targeting the source port of a vulnerable resolver without the need to guess the correct TXID.

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having important severity.

CVSS v3 Scores
  National Vulnerability Database
Base Score 7.5
Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector Network
Attack Complexity Low
Privileges Required None
User Interaction None
Scope Unchanged
Confidentiality Impact None
Integrity Impact None
Availability Impact High
CVSSv3 Version 3.1
SUSE Bugzilla entry: 1230760 [NEW]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
SUSE Package Hub 15 SP6
  • coredns >= 1.11.3-bp156.4.3.1
  • coredns-extras >= 1.11.3-bp156.4.3.1
Patchnames:
openSUSE-2024-319
openSUSE Leap 15.6
  • coredns >= 1.11.3-bp156.4.3.1
  • coredns-extras >= 1.11.3-bp156.4.3.1
Patchnames:
openSUSE-2024-319


SUSE Timeline for this CVE

CVE page created: Wed Sep 18 18:01:16 2024
CVE page last modified: Sat Sep 28 00:47:02 2024