CVE-2024-8418

A flaw was found in Aardvark-dns, which is vulnerable to a Denial of Service attack due to the serial processing of TCP DNS queries. An attacker can exploit this flaw by keeping a TCP connection open indefinitely, causing the server to become unresponsive and resulting in other DNS queries timing out. This issue prevents legitimate users from accessing DNS services, thereby disrupting normal operations and causing service downtime.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:containers:aardvark-dns:1.12.0:*:*:*:*:*:*:*
cpe:2.3:a:containers:aardvark-dns:1.12.1:*:*:*:*:*:*:*

History

17 Sep 2024, 20:15

Type Values Removed Values Added
Summary (en) A flaw was found in Aardvark-dns versions 1.12.0 and 1.12.1. They contain a denial of service vulnerability due to serial processing of TCP DNS queries. This flaw allows a malicious client to keep a TCP connection open indefinitely, causing other DNS queries to time out and resulting in a denial of service for all other containers using aardvark-dns. (en) A flaw was found in Aardvark-dns, which is vulnerable to a Denial of Service attack due to the serial processing of TCP DNS queries. An attacker can exploit this flaw by keeping a TCP connection open indefinitely, causing the server to become unresponsive and resulting in other DNS queries timing out. This issue prevents legitimate users from accessing DNS services, thereby disrupting normal operations and causing service downtime.

05 Sep 2024, 14:18

Type Values Removed Values Added
References () https://access.redhat.com/security/cve/CVE-2024-8418 - () https://access.redhat.com/security/cve/CVE-2024-8418 - Third Party Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=2309683 - () https://bugzilla.redhat.com/show_bug.cgi?id=2309683 - Issue Tracking
References () https://github.com/containers/aardvark-dns/issues/500 - () https://github.com/containers/aardvark-dns/issues/500 - Exploit, Issue Tracking
References () https://github.com/containers/aardvark-dns/pull/503 - () https://github.com/containers/aardvark-dns/pull/503 - Issue Tracking
Summary
  • (es) Se encontró una falla en las versiones 1.12.0 y 1.12.1 de Aardvark-dns. Contienen una vulnerabilidad de denegación de servicio debido al procesamiento en serie de consultas DNS TCP. Esta falla permite que un cliente malintencionado mantenga una conexión TCP abierta indefinidamente, lo que hace que se agote el tiempo de espera de otras consultas DNS y se produzca una denegación de servicio para todos los demás contenedores que utilicen aardvark-dns.
CPE cpe:2.3:a:containers:aardvark-dns:1.12.0:*:*:*:*:*:*:*
cpe:2.3:a:containers:aardvark-dns:1.12.1:*:*:*:*:*:*:*
First Time Containers
Containers aardvark-dns
CWE NVD-CWE-noinfo

04 Sep 2024, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-09-04 15:15

Updated : 2024-09-17 20:15


NVD link : CVE-2024-8418

Mitre link : CVE-2024-8418

CVE.ORG link : CVE-2024-8418


JSON object : View

Products Affected

containers

  • aardvark-dns
CWE
NVD-CWE-noinfo CWE-400

Uncontrolled Resource Consumption