Degraded Performance in BIND Due to Large DNS Caches
CVE-2024-1737
Key Information:
Badges
Summary
This vulnerability affects the BIND DNS server, specifically targeting its resolver caches and authoritative zone databases. When these components hold a substantial number of Resource Records (RRs) for a single hostname, they may experience degraded performance. This can occur both during updates or additions of content and when handling client queries. The affected versions of BIND are known to struggle with such scenarios, potentially affecting the overall efficiency of DNS resolution and impacting service availability.
Affected Version(s)
BIND 9 9.11.0 <= 9.11.37
BIND 9 9.16.0 <= 9.16.50
BIND 9 9.18.0 <= 9.18.27
Get notified when SecurityVulnerability.io launches alerting 🔔
Well keep you posted 📧
News Articles
Ενημερώσεις BIND διορθώνουν τέσσερα σοβαρά σφάλματα DoS
Η Internet Systems Consortium (ISC) κυκλοφόρησε ενημερώσεις ασφαλείας για το BIND που αντιμετωπίζουν σοβαρά σφάλματα DoS.
BIND updates fix high-severity DoS bugs in the DNS software suite
The Internet Systems Consortium (ISC) released BIND security updates that fixed remotely exploitable DoS bugs in the DNS software suite.
IT-Sicherheit: UNIX und Windows bedroht - Update für IT-Sicherheitswarnung zu Internet Systems Consortium BIND (Risiko: mittel)
Eine für Internet Systems Consortium BIND herausgegebene Sicherheitswarnung hat vom BSI ein Update erhalten. Welche Produkte von der Sicherheitslücke betroffen sind, lesen Sie hier auf news.de.
References
CVSS V3.1
Timeline
- 👾
Exploit known to exist
- 📰
First article discovered by Linux Security
Vulnerability published
Vulnerability Reserved