Improper handling of DNS over TCP in Simple DNS Plus v9...
Moderate severity
Unreviewed
Published
Oct 24, 2025
to the GitHub Advisory Database
•
Updated Oct 24, 2025
Description
Published by the National Vulnerability Database
Oct 24, 2025
Published to the GitHub Advisory Database
Oct 24, 2025
Last updated
Oct 24, 2025
Improper handling of DNS over TCP in Simple DNS Plus v9 allows a remote attacker with querying access to the DNS server to cause the server to return request payloads from other clients. This happens when the TCP length prefix is malformed (len differs from actual packet len), and due to a concurrency/buffering issue, even when the lengths match. A length prefix that is smaller than the actual packet size increases information leakage. In summary, this vulnerability allows an attacker to see DNS queries of other clients.
References