CVE-2024-1975

July 23, 2024, 4:15 p.m.

Received
CVE has been recently published to the CVE List and has been received by the NVD.

Products

BIND

  • 9.0.0 - 9.11.37
  • 9.16.0 - 9.16.50
  • 9.18.0 - 9.18.27
  • 9.19.0 - 9.19.24
  • 9.9.3-S1 - 9.11.37-S1
  • 9.16.8-S1 - 9.16.49-S1
  • 9.18.11-S1 - 9.18.27-S1

Source

security-officer@isc.org

Tags

CVE-2024-1975 details

Published : July 23, 2024, 3:15 p.m.
Last Modified : July 23, 2024, 4:15 p.m.

Description

If a server hosts a zone containing a "KEY" Resource Record, or a resolver DNSSEC-validates a "KEY" Resource Record from a DNSSEC-signed domain in cache, a client can exhaust resolver CPU resources by sending a stream of SIG(0) signed requests. This issue affects BIND 9 versions 9.0.0 through 9.11.37, 9.16.0 through 9.16.50, 9.18.0 through 9.18.27, 9.19.0 through 9.19.24, 9.9.3-S1 through 9.11.37-S1, 9.16.8-S1 through 9.16.49-S1, and 9.18.11-S1 through 9.18.27-S1.

CVSS Score

1 2 3 4 5 6 7.5 8 9 10

Weakness

Weakness Name Description

CVSS Data

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

Base Score

7.5

Exploitability Score

3.9

Impact Score

3.6

Base Severity

HIGH

References

URL Source
http://www.openwall.com/lists/oss-security/2024/07/23/1 security-officer@isc.org
https://kb.isc.org/docs/cve-2024-1975 security-officer@isc.org
This website uses the NVD API, but is not approved or certified by it.