By spoofing the target resolver with responses that have...
High severity
Unreviewed
Published
Sep 22, 2022
to the GitHub Advisory Database
•
Updated Jan 28, 2023
Description
Published by the National Vulnerability Database
Sep 21, 2022
Published to the GitHub Advisory Database
Sep 22, 2022
Last updated
Jan 28, 2023
By spoofing the target resolver with responses that have a malformed ECDSA signature, an attacker can trigger a small memory leak. It is possible to gradually erode available memory to the point where named crashes for lack of resources.
References