Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-4076

Опубликовано: 23 июл. 2024
Источник: redhat
CVSS3: 7.5
EPSS Низкий

Описание

Client queries that trigger serving stale data and that also require lookups in local authoritative zone data may result in an assertion failure. This issue affects BIND 9 versions 9.16.13 through 9.16.50, 9.18.0 through 9.18.27, 9.19.0 through 9.19.24, 9.11.33-S1 through 9.11.37-S1, 9.16.13-S1 through 9.16.50-S1, and 9.18.11-S1 through 9.18.27-S1.

A flaw was found in the bind9 package, where a client query triggers stale data and also requires local lookups may trigger a assertion failure. This issue results in a denial of service of the bind server.

Отчет

The discovered flaw in the BIND9 package is of high severity due to its dual impact on DNS server functionality and stability. The issue where client queries trigger the return of stale data undermines the integrity and reliability of DNS responses, potentially leading to incorrect or outdated information being served to clients. This can cause significant disruptions in services reliant on accurate DNS resolutions. Moreover, the assertion failure triggered by local lookups poses a critical threat, as it can crash the BIND server, resulting in a denial of service (DoS). Such an outage disrupts DNS operations, impacting network availability and access to internet services.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6bindNot affected
Red Hat Enterprise Linux 7bindNot affected
Red Hat Enterprise Linux 8bindNot affected
Red Hat Enterprise Linux 9bind9.18Not affected
Red Hat Enterprise Linux 9dhcpNot affected
Red Hat Enterprise Linux 8bind9.16FixedRHSA-2024:539014.08.2024
Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Supportbind9.16FixedRHSA-2024:541815.08.2024
Red Hat Enterprise Linux 8.6 Telecommunications Update Servicebind9.16FixedRHSA-2024:541815.08.2024
Red Hat Enterprise Linux 8.6 Update Services for SAP Solutionsbind9.16FixedRHSA-2024:541815.08.2024
Red Hat Enterprise Linux 8.8 Extended Update Supportbind9.16FixedRHSA-2024:552519.08.2024

Показывать по

Дополнительная информация

Статус:

Important
https://bugzilla.redhat.com/show_bug.cgi?id=2298904bind: bind9: Assertion failure when serving both stale cache data and authoritative zone content

EPSS

Процентиль: 15%
0.0005
Низкий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
11 месяцев назад

Client queries that trigger serving stale data and that also require lookups in local authoritative zone data may result in an assertion failure. This issue affects BIND 9 versions 9.16.13 through 9.16.50, 9.18.0 through 9.18.27, 9.19.0 through 9.19.24, 9.11.33-S1 through 9.11.37-S1, 9.16.13-S1 through 9.16.50-S1, and 9.18.11-S1 through 9.18.27-S1.

CVSS3: 7.5
nvd
11 месяцев назад

Client queries that trigger serving stale data and that also require lookups in local authoritative zone data may result in an assertion failure. This issue affects BIND 9 versions 9.16.13 through 9.16.50, 9.18.0 through 9.18.27, 9.19.0 through 9.19.24, 9.11.33-S1 through 9.11.37-S1, 9.16.13-S1 through 9.16.50-S1, and 9.18.11-S1 through 9.18.27-S1.

CVSS3: 7.5
msrc
10 месяцев назад

Описание отсутствует

CVSS3: 7.5
debian
11 месяцев назад

Client queries that trigger serving stale data and that also require l ...

CVSS3: 7.5
github
11 месяцев назад

Client queries that trigger serving stale data and that also require lookups in local authoritative zone data may result in an assertion failure. This issue affects BIND 9 versions 9.16.13 through 9.16.50, 9.18.0 through 9.18.27, 9.19.0 through 9.19.24, 9.11.33-S1 through 9.11.37-S1, 9.16.13-S1 through 9.16.50-S1, and 9.18.11-S1 through 9.18.27-S1.

EPSS

Процентиль: 15%
0.0005
Низкий

7.5 High

CVSS3

Уязвимость CVE-2024-4076