Improper handling of DNS over TCP in Simple DNS Plus v9 allows a remote attacker with querying access to the DNS server to cause the server to return request payloads from other clients. This happens when the TCP length prefix is malformed (len differs from actual packet len), and due to a concurrency/buffering issue, even when the lengths match. A length prefix that is smaller than the actual packet size increases information leakage. In summary, this vulnerability allows an attacker to see DNS queries of other clients.
History

Mon, 27 Oct 2025 22:30:00 +0000

Type Values Removed Values Added
First Time appeared Simpledns
Simpledns simple Dns Plus
Vendors & Products Simpledns
Simpledns simple Dns Plus

Fri, 24 Oct 2025 17:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-350
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 24 Oct 2025 14:45:00 +0000

Type Values Removed Values Added
Description Improper handling of DNS over TCP in Simple DNS Plus v9 allows a remote attacker with querying access to the DNS server to cause the server to return request payloads from other clients. This happens when the TCP length prefix is malformed (len differs from actual packet len), and due to a concurrency/buffering issue, even when the lengths match. A length prefix that is smaller than the actual packet size increases information leakage. In summary, this vulnerability allows an attacker to see DNS queries of other clients.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2025-10-24T00:00:00.000Z

Updated: 2025-10-24T16:40:04.156Z

Reserved: 2025-09-26T00:00:00.000Z

Link: CVE-2025-61430

cve-icon Vulnrichment

Updated: 2025-10-24T16:39:51.218Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-10-24T15:15:40.703

Modified: 2025-10-27T13:20:15.637

Link: CVE-2025-61430

cve-icon Redhat

No data.