{"id":"CVE-2017-15133","details":"A denial of service flaw was found in miekg-dns before 1.0.4. A remote attacker could use carefully timed TCP packets to block the DNS server from accepting new connections.","aliases":["GHSA-p55x-7x9v-q8m4","GO-2020-0006"],"modified":"2026-04-10T03:57:22.365323Z","published":"2018-01-29T19:29:00.267Z","references":[{"type":"REPORT","url":"https://github.com/miekg/dns/issues/627"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1538763"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/miekg/dns","events":[{"introduced":"0"},{"fixed":"5364553f1ee9cddc7ac8b62dce148309c386695b"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"1.0.4"}]}}],"versions":["v1.0.0","v1.0.1","v1.0.3"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2017-15133.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}