CVE-2025-61430

Improper handling of DNS over TCP in Simple DNS Plus v9 allows a remote attacker with querying access to the DNS server to cause the server to return request payloads from other clients. This happens when the TCP length prefix is malformed (len differs from actual packet len), and due to a concurrency/buffering issue, even when the lengths match. A length prefix that is smaller than the actual packet size increases information leakage. In summary, this vulnerability allows an attacker to see DNS queries of other clients.
Configurations

No configuration.

History

24 Oct 2025, 17:15

Type Values Removed Values Added
CWE CWE-350
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.5

24 Oct 2025, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-10-24 15:15

Updated : 2025-10-24 17:15


NVD link : CVE-2025-61430

Mitre link : CVE-2025-61430

CVE.ORG link : CVE-2025-61430


JSON object : View

Products Affected

No product.

CWE
CWE-350

Reliance on Reverse DNS Resolution for a Security-Critical Action