KeyTrap in DNS (CVE-2023-50387) POC

KeyTrap in DNS (CVE-2023-50387) POC

vPython by Prapattimynk

Certain DNSSEC aspects of the DNS protocol (in RFC 4033, 4034, 4035, 6840, and related RFCs) allow remote attackers to cause a denial of service (CPU consumption) via one or more DNSSEC responses, aka

Android Android 5.0Exploits And POCs
( 437 ratings )
Price: $0
File KeyTrap in DNS (CVE-2023-50387) POC
Publisher Prapattimynk
Genre Exploits And POCs
Size -
File Type Python
Os All
Mod Version Python
Report Report
KeyTrap in DNS (CVE-2023-50387) POC is the most famous version in the KeyTrap in DNS (CVE-2023-50387) POC series of publisher
Download

Certain DNSSEC aspects of the DNS protocol (in RFC 4033, 4034, 4035, 6840, and related RFCs) allow remote attackers to cause a denial of service (CPU consumption) via one or more DNSSEC responses, aka the “KeyTrap” issue. One of the concerns is that, when there is a zone with many DNSKEY and RRSIG records, the protocol specification implies that an algorithm must evaluate all combinations of DNSKEY and RRSIG records.



Recommended for You

You may also like

Comments

Your email address will not be published. Required fields are marked *

Next Post X
Ads Blocker Image Powered by Code Help Pro

AdBlocker Detected!!!

We have detected that you are using extensions to block ads. Please support us by disabling these ads blocker.