Improper handling of DNS over TCP in Simple DNS Plus v9 allows a remote attacker with querying access to the DNS server to cause the server to return request payloads from other clients. This happens when the TCP length prefix is malformed (len differs from actual packet len), and due to a concurrency/buffering issue, even when the lengths match. A length prefix that is smaller than the actual packet size increases information leakage. In summary, this vulnerability allows an attacker to see DNS queries of other clients.
Metrics
Affected Vendors & Products
References
History
Mon, 27 Oct 2025 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Simpledns
Simpledns simple Dns Plus |
|
| Vendors & Products |
Simpledns
Simpledns simple Dns Plus |
Fri, 24 Oct 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-350 | |
| Metrics |
cvssV3_1
|
Fri, 24 Oct 2025 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Improper handling of DNS over TCP in Simple DNS Plus v9 allows a remote attacker with querying access to the DNS server to cause the server to return request payloads from other clients. This happens when the TCP length prefix is malformed (len differs from actual packet len), and due to a concurrency/buffering issue, even when the lengths match. A length prefix that is smaller than the actual packet size increases information leakage. In summary, this vulnerability allows an attacker to see DNS queries of other clients. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published: 2025-10-24T00:00:00.000Z
Updated: 2025-10-24T16:40:04.156Z
Reserved: 2025-09-26T00:00:00.000Z
Link: CVE-2025-61430
Updated: 2025-10-24T16:39:51.218Z
Status : Awaiting Analysis
Published: 2025-10-24T15:15:40.703
Modified: 2025-10-27T13:20:15.637
Link: CVE-2025-61430
No data.