Products
BIND
- 9.0.0 - 9.11.37
- 9.16.0 - 9.16.50
- 9.18.0 - 9.18.27
- 9.19.0 - 9.19.24
- 9.9.3-S1 - 9.11.37-S1
- 9.16.8-S1 - 9.16.49-S1
- 9.18.11-S1 - 9.18.27-S1
Source
security-officer@isc.org
Tags
CVE-2024-1975 details
Published : July 23, 2024, 3:15 p.m.
Last Modified : July 23, 2024, 4:15 p.m.
Last Modified : July 23, 2024, 4:15 p.m.
Description
If a server hosts a zone containing a "KEY" Resource Record, or a resolver DNSSEC-validates a "KEY" Resource Record from a DNSSEC-signed domain in cache, a client can exhaust resolver CPU resources by sending a stream of SIG(0) signed requests. This issue affects BIND 9 versions 9.0.0 through 9.11.37, 9.16.0 through 9.16.50, 9.18.0 through 9.18.27, 9.19.0 through 9.19.24, 9.9.3-S1 through 9.11.37-S1, 9.16.8-S1 through 9.16.49-S1, and 9.18.11-S1 through 9.18.27-S1.
CVSS Score
1 | 2 | 3 | 4 | 5 | 6 | 7.5 | 8 | 9 | 10 |
---|
Weakness
Weakness | Name | Description |
---|
CVSS Data
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
Base Score
7.5
Exploitability Score
3.9
Impact Score
3.6
Base Severity
HIGH
Vector String : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
References
URL | Source |
---|---|
http://www.openwall.com/lists/oss-security/2024/07/23/1 | security-officer@isc.org |
https://kb.isc.org/docs/cve-2024-1975 | security-officer@isc.org |
This website uses the NVD API, but is not approved or certified by it.