Metrics
Affected Vendors & Products
Fri, 21 Feb 2025 03:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:/o:redhat:rhel_els:7 |
Thu, 20 Feb 2025 02:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat enterprise Linux
Redhat rhel Aus Redhat rhel Els Redhat rhel Tus |
|
CPEs | cpe:/a:redhat:enterprise_linux:8 cpe:/a:redhat:enterprise_linux:9 cpe:/a:redhat:rhel_aus:8.2 cpe:/a:redhat:rhel_aus:8.4 cpe:/a:redhat:rhel_aus:8.6 cpe:/a:redhat:rhel_e4s:8.4 cpe:/a:redhat:rhel_e4s:8.6 cpe:/a:redhat:rhel_tus:8.4 cpe:/a:redhat:rhel_tus:8.6 cpe:/o:redhat:enterprise_linux:8 cpe:/o:redhat:rhel_aus:7.7 cpe:/o:redhat:rhel_els:6 |
|
Vendors & Products |
Redhat enterprise Linux
Redhat rhel Aus Redhat rhel Els Redhat rhel Tus |
Wed, 19 Feb 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat
Redhat rhel E4s Redhat rhel Eus |
|
CPEs | cpe:/a:redhat:rhel_e4s:9.0 cpe:/a:redhat:rhel_eus:8.8 cpe:/a:redhat:rhel_eus:9.2 cpe:/a:redhat:rhel_eus:9.4 |
|
Vendors & Products |
Redhat
Redhat rhel E4s Redhat rhel Eus |
Tue, 11 Feb 2025 19:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Fri, 07 Feb 2025 17:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Thu, 30 Jan 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 30 Jan 2025 01:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-400 | |
References |
| |
Metrics |
threat_severity
|
threat_severity
|
Wed, 29 Jan 2025 21:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | It is possible to construct a zone such that some queries to it will generate responses containing numerous records in the Additional section. An attacker sending many such queries can cause either the authoritative server itself or an independent resolver to use disproportionate resources processing the queries. Zones will usually need to have been deliberately crafted to attack this exposure. This issue affects BIND 9 versions 9.11.0 through 9.11.37, 9.16.0 through 9.16.50, 9.18.0 through 9.18.32, 9.20.0 through 9.20.4, 9.21.0 through 9.21.3, 9.11.3-S1 through 9.11.37-S1, 9.16.8-S1 through 9.16.50-S1, and 9.18.11-S1 through 9.18.32-S1. | |
Title | Many records in the additional section cause CPU exhaustion | |
Weaknesses | CWE-405 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: isc
Published:
Updated: 2025-02-11T19:02:32.914Z
Reserved: 2024-11-13T17:20:48.660Z
Link: CVE-2024-11187

Updated: 2025-02-11T19:02:32.914Z

Status : Awaiting Analysis
Published: 2025-01-29T22:15:28.637
Modified: 2025-02-11T19:15:12.640
Link: CVE-2024-11187
