Description

Improper handling of DNS over TCP in Simple DNS Plus v9 allows a remote attacker with querying access to the DNS server to cause the server to return request payloads from other clients. This happens when the TCP length prefix is malformed (len differs from actual packet len), and due to a concurrency/buffering issue, even when the lengths match. A length prefix that is smaller than the actual packet size increases information leakage. In summary, this vulnerability allows an attacker to see DNS queries of other clients.

INFO

Published Date :

2025-10-24T00:00:00.000Z

Last Modified :

2025-10-24T16:40:04.156Z

Source :

mitre
AFFECTED PRODUCTS

The following products are affected by CVE-2025-61430 vulnerability.

Vendors Products
Simpledns
  • Simple Dns Plus
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2025-61430.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact