A malicious client can send many DNS messages over TCP, potentially causing the server to become unstable while the attack is in progress. The server may recover after the attack ceases. Use of ACLs will not mitigate the attack.
This issue affects BIND 9 versions 9.18.1 through 9.18.27, 9.19.0 through 9.19.24, and 9.18.11-S1 through 9.18.27-S1.
References
Configurations
No configuration.
History
01 Aug 2024, 13:45
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-770 |
31 Jul 2024, 11:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
24 Jul 2024, 12:55
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
23 Jul 2024, 16:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
23 Jul 2024, 15:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-07-23 15:15
Updated : 2024-08-01 13:45
NVD link : CVE-2024-0760
Mitre link : CVE-2024-0760
CVE.ORG link : CVE-2024-0760
JSON object : View
Products Affected
No product.
CWE
CWE-770
Allocation of Resources Without Limits or Throttling