By spoofing the target resolver with responses that have a malformed ECDSA signature, an attacker can trigger a small memory leak. It is possible to gradually erode available memory to the point where named crashes for lack of resources.
No PoCs from references.
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Maribel0370/Nebula-io
- https://github.com/karimhabush/cyberowl
- https://github.com/krlabs/dnsbind-vulnerabilities