A malicious client can send many DNS messages over TCP, potentially causing the server to become unstable while the attack is in progress. The server may recover after the attack ceases. Use of ACLs will not mitigate the attack.
This issue affects BIND 9 versions 9.18.1 through 9.18.27, 9.19.0 through 9.19.24, and 9.18.11-S1 through 9.18.27-S1.
Metrics
Affected Vendors & Products
References
History
Thu, 13 Feb 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Isc
Isc bind |
|
CPEs | cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:* | |
Vendors & Products |
Isc
Isc bind |
|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: isc
Published:
Updated: 2025-02-13T17:27:19.172Z
Reserved: 2024-01-19T20:26:52.962Z
Link: CVE-2024-0760

Updated: 2024-08-01T18:18:18.515Z

Status : Awaiting Analysis
Published: 2024-07-23T15:15:03.520
Modified: 2024-11-21T08:47:18.850
Link: CVE-2024-0760
