The DNS protocol in RFC 1035 and updates allows remote attackers to cause a denial of service (resource consumption) by arranging for DNS queries to be accumulated for seconds, such that responses are later sent in a pulsing burst (which can be considered traffic amplification in some cases), aka the "DNSBomb" issue.
References
Link Providers
https://www.spirityenterprise.com/pentest spirity
https://www.spirityenterprise.com/managed-detection-response spirity
https://alas.aws.amazon.com/ALAS-2024-1934.html cve-icon cve-icon
https://datatracker.ietf.org/doc/html/rfc1035 cve-icon cve-icon
https://github.com/NLnetLabs/unbound/commit/c3206f4568f60c486be6d165b1f2b5b254fea3de cve-icon cve-icon
https://github.com/TechnitiumSoftware/DnsServer/blob/master/CHANGELOG.md#version-120 cve-icon cve-icon
https://gitlab.isc.org/isc-projects/bind9/-/issues/4398 cve-icon cve-icon
https://lists.debian.org/debian-lts-announce/2025/08/msg00019.html cve-icon
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3TBXPRJ2Q235YUZKYDRWOSYNDFBJQWJ3/ cve-icon cve-icon
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QITY2QBX2OCBTZIXD2A5ES62STFIA4AL/ cve-icon cve-icon
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3TBXPRJ2Q235YUZKYDRWOSYNDFBJQWJ3/ cve-icon
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QITY2QBX2OCBTZIXD2A5ES62STFIA4AL/ cve-icon
https://meterpreter.org/researchers-uncover-dnsbomb-a-new-pdos-attack-exploiting-legitimate-dns-features/ cve-icon cve-icon
https://nlnetlabs.nl/downloads/unbound/CVE-2024-33655.txt cve-icon cve-icon
https://nlnetlabs.nl/projects/unbound/security-advisories/ cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2024-33655 cve-icon
https://sp2024.ieee-security.org/accepted-papers.html cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2024-33655 cve-icon
https://www.isc.org/blogs/2024-dnsbomb/ cve-icon cve-icon
https://www.nlnetlabs.nl/news/2024/May/08/unbound-1.20.0-released/ cve-icon
History

Tue, 04 Nov 2025 22:30:00 +0000


Tue, 04 Nov 2025 18:30:00 +0000


Mon, 03 Nov 2025 19:30:00 +0000

Type Values Removed Values Added
References

Mon, 03 Nov 2025 19:15:00 +0000

Type Values Removed Values Added
First Time appeared Technitium
Technitium dns Server
CPEs cpe:2.3:a:technitium:dns_server:*:*:*:*:*:*:*:*
Vendors & Products Technitium
Technitium dns Server
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 22 Aug 2024 20:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 3.7, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L'}

cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-11-04T22:06:13.914Z

Reserved: 2024-04-25T00:00:00.000Z

Link: CVE-2024-33655

cve-icon Vulnrichment

Updated: 2025-11-04T22:06:13.914Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-06-06T17:15:51.040

Modified: 2025-11-04T22:16:01.073

Link: CVE-2024-33655

cve-icon Redhat

Severity : Low

Publid Date: 2024-05-09T00:00:00Z

Links: CVE-2024-33655 - Bugzilla