Vulnerability Details : CVE-2022-33993
Misinterpretation of special domain name characters in DNRD (aka Domain Name Relay Daemon) 2.20.3 leads to cache poisoning because domain names and their associated IP addresses are cached in their misinterpreted form.
Products affected by CVE-2022-33993
- cpe:2.3:a:domain_name_relay_daemon_project:domain_name_relay_daemon:2.20.3:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-33993
0.08%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 20 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-33993
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.3
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N |
3.9
|
1.4
|
NIST |
References for CVE-2022-33993
-
https://www.usenix.org/conference/usenixsecurity22/presentation/jeitner
XDRI Attacks - and - How to Enhance Resilience of Residential Routers | USENIXThird Party Advisory
-
https://www.openwall.com/lists/oss-security/2022/08/14/1
Mailing List;Third Party Advisory
-
https://www.usenix.org/conference/usenixsecurity21/presentation/jeitner
Injection Attacks Reloaded: Tunnelling Malicious Payloads over DNS | USENIXThird Party Advisory
-
http://dnrd.sourceforge.net/
Product;Third Party Advisory
Jump to