CVE-2024-33655
Unbound vulnerability analysis and mitigation

Overview

The DNS protocol in RFC 1035 and updates is affected by a vulnerability known as 'DNSBomb' (CVE-2024-33655), discovered by Xiang Li from the Network and Information Security Lab of Tsinghua University. This vulnerability allows remote attackers to cause a denial of service (resource consumption) by arranging for DNS queries to be accumulated for seconds, such that responses are later sent in a pulsing burst, which can be considered traffic amplification in some cases (NVD, Unbound Advisory).

Technical details

The DNSBomb attack operates in three phases: First, it accumulates DNS queries at a low rate by exploiting DNS timeout mechanisms. Second, it amplifies queries into larger responses through query aggregation and specially crafted zones. Finally, it concentrates all responses into short, high-volume periodic bursts by controlling response timing. The attack can achieve an amplification factor exceeding 20,000x in some cases, with peak pulse magnitude approaching 8.7Gb/s (Meterpreter, BIND Blog).

Impact

The vulnerability can lead to denial of service conditions by overwhelming target systems with synchronized response streams. The attack is particularly effective because it uses legitimate DNS features and can bypass current mitigation patches for DNS cache poisoning attacks. The pulsing nature of the attack makes it harder to detect compared to traditional DoS attacks, as it maintains a low average traffic rate while creating periodic overwhelming bursts (Meterpreter).

Mitigation and workarounds

Several mitigation measures have been implemented in DNS software updates. These include limiting query rate and timeout values, standardizing maximum response size to client, and implementing response-returning speed controls. Specific configuration options include setting discard-timeout to 1900ms, wait-limit to 1000, and wait-limit-cookie to 10000. Software vendors have released patches, with Unbound version 1.20.0 containing fixes that significantly lower the impact of DoS attacks (Unbound Advisory).

Community reactions

The vulnerability has received significant attention from the DNS software community. BIND developers have stated that their software is not significantly affected by this attack due to existing rate limits and configurations. The research was presented at the 45th IEEE Symposium on Security and Privacy and previously at GEEKCON 2023 in Shanghai (BIND Blog).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management