
Cloud Vulnerability DB
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
The DNS protocol in RFC 1035 and updates is affected by a vulnerability known as 'DNSBomb' (CVE-2024-33655), discovered by Xiang Li from the Network and Information Security Lab of Tsinghua University. This vulnerability allows remote attackers to cause a denial of service (resource consumption) by arranging for DNS queries to be accumulated for seconds, such that responses are later sent in a pulsing burst, which can be considered traffic amplification in some cases (NVD, Unbound Advisory).
The DNSBomb attack operates in three phases: First, it accumulates DNS queries at a low rate by exploiting DNS timeout mechanisms. Second, it amplifies queries into larger responses through query aggregation and specially crafted zones. Finally, it concentrates all responses into short, high-volume periodic bursts by controlling response timing. The attack can achieve an amplification factor exceeding 20,000x in some cases, with peak pulse magnitude approaching 8.7Gb/s (Meterpreter, BIND Blog).
The vulnerability can lead to denial of service conditions by overwhelming target systems with synchronized response streams. The attack is particularly effective because it uses legitimate DNS features and can bypass current mitigation patches for DNS cache poisoning attacks. The pulsing nature of the attack makes it harder to detect compared to traditional DoS attacks, as it maintains a low average traffic rate while creating periodic overwhelming bursts (Meterpreter).
Several mitigation measures have been implemented in DNS software updates. These include limiting query rate and timeout values, standardizing maximum response size to client, and implementing response-returning speed controls. Specific configuration options include setting discard-timeout to 1900ms, wait-limit to 1000, and wait-limit-cookie to 10000. Software vendors have released patches, with Unbound version 1.20.0 containing fixes that significantly lower the impact of DoS attacks (Unbound Advisory).
The vulnerability has received significant attention from the DNS software community. BIND developers have stated that their software is not significantly affected by this attack due to existing rate limits and configurations. The research was presented at the 45th IEEE Symposium on Security and Privacy and previously at GEEKCON 2023 in Shanghai (BIND Blog).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A comprehensive threat intelligence database of cloud security incidents, actors, tools and techniques
A step-by-step framework for modeling and improving SaaS and PaaS tenant isolation
Get a personalized demo
“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
“We know that if Wiz identifies something as critical, it actually is.”