CVE-2024-1975
SIG(0) can be used to exhaust CPU resources
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
If a server hosts a zone containing a "KEY" Resource Record, or a resolver DNSSEC-validates a "KEY" Resource Record from a DNSSEC-signed domain in cache, a client can exhaust resolver CPU resources by sending a stream of SIG(0) signed requests.
This issue affects BIND 9 versions 9.0.0 through 9.11.37, 9.16.0 through 9.16.50, 9.18.0 through 9.18.27, 9.19.0 through 9.19.24, 9.9.3-S1 through 9.11.37-S1, 9.16.8-S1 through 9.16.49-S1, and 9.18.11-S1 through 9.18.27-S1.
Si un servidor aloja una zona que contiene un registro de recursos "KEY", o un solucionador DNSSEC valida un registro de recursos "KEY" de un dominio firmado por DNSSEC en caché, un cliente puede agotar los recursos de la CPU del solucionador enviando una secuencia de solicitudes firmadas SIG(0). Este problema afecta a las versiones de BIND 9 9.0.0 a 9.11.37, 9.16.0 a 9.16.50, 9.18.0 a 9.18.27, 9.19.0 a 9.19.24, 9.9.3-S1 a 9.11.37-S1, 9.16.8-S1 a 9.16.49-S1 y 9.18.11-S1 a 9.18.27-S1.
A flaw was found in the bind9 package, where if a DNS server hosts a zone containing a "KEY" resource record or a DNS resolver utilizes the DNSSEC validate feature to validate a "KEY" resource record, a malicious client could exhaust the CPU resourced from the resolver by sending a stream of SIG(0) signed requests. This issue can lead to a denial of service.
CVSS Scores
SSVC
- Decision:Attend
Timeline
- 2024-02-28 CVE Reserved
- 2024-07-23 CVE Published
- 2024-08-01 CVE Updated
- 2024-08-01 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-400: Uncontrolled Resource Consumption
- CWE-770: Allocation of Resources Without Limits or Throttling
CAPEC
References (5)
URL | Tag | Source |
---|---|---|
http://www.openwall.com/lists/oss-security/2024/07/23/1 | ||
http://www.openwall.com/lists/oss-security/2024/07/31/2 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://kb.isc.org/docs/cve-2024-1975 | 2024-07-24 | |
https://access.redhat.com/security/cve/CVE-2024-1975 | 2024-09-18 | |
https://bugzilla.redhat.com/show_bug.cgi?id=2298901 | 2024-09-18 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
ISC Search vendor "ISC" | BIND 9 Search vendor "ISC" for product "BIND 9" | >= 9.0.0 <= 9.11.37 Search vendor "ISC" for product "BIND 9" and version " >= 9.0.0 <= 9.11.37" | en |
Affected
| ||||||
ISC Search vendor "ISC" | BIND 9 Search vendor "ISC" for product "BIND 9" | >= 9.16.0 <= 9.16.50 Search vendor "ISC" for product "BIND 9" and version " >= 9.16.0 <= 9.16.50" | en |
Affected
| ||||||
ISC Search vendor "ISC" | BIND 9 Search vendor "ISC" for product "BIND 9" | >= 9.18.0 <= 9.18.27 Search vendor "ISC" for product "BIND 9" and version " >= 9.18.0 <= 9.18.27" | en |
Affected
| ||||||
ISC Search vendor "ISC" | BIND 9 Search vendor "ISC" for product "BIND 9" | >= 9.19.0 <= 9.19.24 Search vendor "ISC" for product "BIND 9" and version " >= 9.19.0 <= 9.19.24" | en |
Affected
|