RFC 9267
Common Implementation Anti-Patterns Related to Domain Name System (DNS) Resource Record (RR) Processing, July 2022
- File formats:
- Also available: XML file for editing
- Status:
- INFORMATIONAL
- Authors:
- S. Dashevskyi
D. dos Santos
J. Wetzels
A. Amri - Stream:
- INDEPENDENT
Cite this RFC: TXT | XML | BibTeX
DOI: https://doi.org/10.17487/RFC9267
Discuss this RFC: Send questions or comments to the mailing list rfc-ise@rfc-editor.org
Other actions: Submit Errata | Find IPR Disclosures from the IETF | View History of RFC 9267
Abstract
This memo describes common vulnerabilities related to Domain Name System (DNS) resource record (RR) processing as seen in several DNS client implementations. These vulnerabilities may lead to successful Denial-of-Service and Remote Code Execution attacks against the affected software. Where applicable, violations of RFC 1035 are mentioned.
For the definition of Status, see RFC 2026.
For the definition of Stream, see RFC 8729.