Degraded Performance in BIND Due to Large DNS Caches
CVE-2024-1737

7.5HIGH

Key Information:

Vendor
Isc
Status
Vendor
CVE Published:
23 July 2024

Badges

👾 Exploit Exists📰 News Worthy

Summary

This vulnerability affects the BIND DNS server, specifically targeting its resolver caches and authoritative zone databases. When these components hold a substantial number of Resource Records (RRs) for a single hostname, they may experience degraded performance. This can occur both during updates or additions of content and when handling client queries. The affected versions of BIND are known to struggle with such scenarios, potentially affecting the overall efficiency of DNS resolution and impacting service availability.

Affected Version(s)

BIND 9 9.11.0 <= 9.11.37

BIND 9 9.16.0 <= 9.16.50

BIND 9 9.18.0 <= 9.18.27

News Articles

Ενημερώσεις BIND διορθώνουν τέσσερα σοβαρά σφάλματα DoS

Η Internet Systems Consortium (ISC) κυκλοφόρησε ενημερώσεις ασφαλείας για το BIND που αντιμετωπίζουν σοβαρά σφάλματα DoS.

BIND updates fix high-severity DoS bugs in the DNS software suite

The Internet Systems Consortium (ISC) released BIND security updates that fixed remotely exploitable DoS bugs in the DNS software suite.

IT-Sicherheit: UNIX und Windows bedroht - Update für IT-Sicherheitswarnung zu Internet Systems Consortium BIND (Risiko: mittel)

Eine für Internet Systems Consortium BIND herausgegebene Sicherheitswarnung hat vom BSI ein Update erhalten. Welche Produkte von der Sicherheitslücke betroffen sind, lesen Sie hier auf news.de.

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • 👾

    Exploit known to exist

  • 📰

    First article discovered by Linux Security

  • Vulnerability published

  • Vulnerability Reserved

Credit

ISC would like to thank Toshifumi Sakaguchi for bringing this vulnerability to our attention.
.