Логотип exploitDog
bind:"CVE-2024-11187" OR bind:"CVE-2024-12705"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2024-11187" OR bind:"CVE-2024-12705"

Количество 31

Количество 31

suse-cvrf логотип

SUSE-SU-2025:0355-1

12 месяцев назад

Security update for bind

EPSS: Низкий
rocky логотип

RLSA-2025:1670

10 месяцев назад

Important: bind9.18 security update

EPSS: Низкий
oracle-oval логотип

ELSA-2025-1670

11 месяцев назад

ELSA-2025-1670: bind9.18 security update (IMPORTANT)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:01787-1

8 месяцев назад

Security update for bind

EPSS: Низкий
ubuntu логотип

CVE-2024-12705

12 месяцев назад

Clients using DNS-over-HTTPS (DoH) can exhaust a DNS resolver's CPU and/or memory by flooding it with crafted valid or invalid HTTP/2 traffic. This issue affects BIND 9 versions 9.18.0 through 9.18.32, 9.20.0 through 9.20.4, 9.21.0 through 9.21.3, and 9.18.11-S1 through 9.18.32-S1.

CVSS3: 7.5
EPSS: Низкий
redhat логотип

CVE-2024-12705

почти 2 года назад

Clients using DNS-over-HTTPS (DoH) can exhaust a DNS resolver's CPU and/or memory by flooding it with crafted valid or invalid HTTP/2 traffic. This issue affects BIND 9 versions 9.18.0 through 9.18.32, 9.20.0 through 9.20.4, 9.21.0 through 9.21.3, and 9.18.11-S1 through 9.18.32-S1.

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2024-12705

12 месяцев назад

Clients using DNS-over-HTTPS (DoH) can exhaust a DNS resolver's CPU and/or memory by flooding it with crafted valid or invalid HTTP/2 traffic. This issue affects BIND 9 versions 9.18.0 through 9.18.32, 9.20.0 through 9.20.4, 9.21.0 through 9.21.3, and 9.18.11-S1 through 9.18.32-S1.

CVSS3: 7.5
EPSS: Низкий
msrc логотип

CVE-2024-12705

11 месяцев назад

DNS-over-HTTPS implementation suffers from multiple issues under heavy query load

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2024-12705

12 месяцев назад

Clients using DNS-over-HTTPS (DoH) can exhaust a DNS resolver's CPU an ...

CVSS3: 7.5
EPSS: Низкий
ubuntu логотип

CVE-2024-11187

12 месяцев назад

It is possible to construct a zone such that some queries to it will generate responses containing numerous records in the Additional section. An attacker sending many such queries can cause either the authoritative server itself or an independent resolver to use disproportionate resources processing the queries. Zones will usually need to have been deliberately crafted to attack this exposure. This issue affects BIND 9 versions 9.11.0 through 9.11.37, 9.16.0 through 9.16.50, 9.18.0 through 9.18.32, 9.20.0 through 9.20.4, 9.21.0 through 9.21.3, 9.11.3-S1 through 9.11.37-S1, 9.16.8-S1 through 9.16.50-S1, and 9.18.11-S1 through 9.18.32-S1.

CVSS3: 7.5
EPSS: Низкий
redhat логотип

CVE-2024-11187

12 месяцев назад

It is possible to construct a zone such that some queries to it will generate responses containing numerous records in the Additional section. An attacker sending many such queries can cause either the authoritative server itself or an independent resolver to use disproportionate resources processing the queries. Zones will usually need to have been deliberately crafted to attack this exposure. This issue affects BIND 9 versions 9.11.0 through 9.11.37, 9.16.0 through 9.16.50, 9.18.0 through 9.18.32, 9.20.0 through 9.20.4, 9.21.0 through 9.21.3, 9.11.3-S1 through 9.11.37-S1, 9.16.8-S1 through 9.16.50-S1, and 9.18.11-S1 through 9.18.32-S1.

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2024-11187

12 месяцев назад

It is possible to construct a zone such that some queries to it will generate responses containing numerous records in the Additional section. An attacker sending many such queries can cause either the authoritative server itself or an independent resolver to use disproportionate resources processing the queries. Zones will usually need to have been deliberately crafted to attack this exposure. This issue affects BIND 9 versions 9.11.0 through 9.11.37, 9.16.0 through 9.16.50, 9.18.0 through 9.18.32, 9.20.0 through 9.20.4, 9.21.0 through 9.21.3, 9.11.3-S1 through 9.11.37-S1, 9.16.8-S1 through 9.16.50-S1, and 9.18.11-S1 through 9.18.32-S1.

CVSS3: 7.5
EPSS: Низкий
msrc логотип

CVE-2024-11187

6 месяцев назад

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2024-11187

12 месяцев назад

It is possible to construct a zone such that some queries to it will g ...

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-gf34-2fpp-vmc4

12 месяцев назад

Clients using DNS-over-HTTPS (DoH) can exhaust a DNS resolver's CPU and/or memory by flooding it with crafted valid or invalid HTTP/2 traffic. This issue affects BIND 9 versions 9.18.0 through 9.18.32, 9.20.0 through 9.20.4, 9.21.0 through 9.21.3, and 9.18.11-S1 through 9.18.32-S1.

CVSS3: 7.5
EPSS: Низкий
fstec логотип

BDU:2025-07734

12 месяцев назад

Уязвимость реализации DoH сервера DNS BIND, связанная с выделением неограниченной памяти, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:0427-1

11 месяцев назад

Security update for bind

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:0389-1

11 месяцев назад

Security update for bind

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:0384-1

11 месяцев назад

Security update for bind

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:0359-1

12 месяцев назад

Security update for bind

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
suse-cvrf логотип
SUSE-SU-2025:0355-1

Security update for bind

12 месяцев назад
rocky логотип
RLSA-2025:1670

Important: bind9.18 security update

10 месяцев назад
oracle-oval логотип
ELSA-2025-1670

ELSA-2025-1670: bind9.18 security update (IMPORTANT)

11 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:01787-1

Security update for bind

8 месяцев назад
ubuntu логотип
CVE-2024-12705

Clients using DNS-over-HTTPS (DoH) can exhaust a DNS resolver's CPU and/or memory by flooding it with crafted valid or invalid HTTP/2 traffic. This issue affects BIND 9 versions 9.18.0 through 9.18.32, 9.20.0 through 9.20.4, 9.21.0 through 9.21.3, and 9.18.11-S1 through 9.18.32-S1.

CVSS3: 7.5
0%
Низкий
12 месяцев назад
redhat логотип
CVE-2024-12705

Clients using DNS-over-HTTPS (DoH) can exhaust a DNS resolver's CPU and/or memory by flooding it with crafted valid or invalid HTTP/2 traffic. This issue affects BIND 9 versions 9.18.0 through 9.18.32, 9.20.0 through 9.20.4, 9.21.0 through 9.21.3, and 9.18.11-S1 through 9.18.32-S1.

CVSS3: 7.5
0%
Низкий
почти 2 года назад
nvd логотип
CVE-2024-12705

Clients using DNS-over-HTTPS (DoH) can exhaust a DNS resolver's CPU and/or memory by flooding it with crafted valid or invalid HTTP/2 traffic. This issue affects BIND 9 versions 9.18.0 through 9.18.32, 9.20.0 through 9.20.4, 9.21.0 through 9.21.3, and 9.18.11-S1 through 9.18.32-S1.

CVSS3: 7.5
0%
Низкий
12 месяцев назад
msrc логотип
CVE-2024-12705

DNS-over-HTTPS implementation suffers from multiple issues under heavy query load

CVSS3: 7.5
0%
Низкий
11 месяцев назад
debian логотип
CVE-2024-12705

Clients using DNS-over-HTTPS (DoH) can exhaust a DNS resolver's CPU an ...

CVSS3: 7.5
0%
Низкий
12 месяцев назад
ubuntu логотип
CVE-2024-11187

It is possible to construct a zone such that some queries to it will generate responses containing numerous records in the Additional section. An attacker sending many such queries can cause either the authoritative server itself or an independent resolver to use disproportionate resources processing the queries. Zones will usually need to have been deliberately crafted to attack this exposure. This issue affects BIND 9 versions 9.11.0 through 9.11.37, 9.16.0 through 9.16.50, 9.18.0 through 9.18.32, 9.20.0 through 9.20.4, 9.21.0 through 9.21.3, 9.11.3-S1 through 9.11.37-S1, 9.16.8-S1 through 9.16.50-S1, and 9.18.11-S1 through 9.18.32-S1.

CVSS3: 7.5
1%
Низкий
12 месяцев назад
redhat логотип
CVE-2024-11187

It is possible to construct a zone such that some queries to it will generate responses containing numerous records in the Additional section. An attacker sending many such queries can cause either the authoritative server itself or an independent resolver to use disproportionate resources processing the queries. Zones will usually need to have been deliberately crafted to attack this exposure. This issue affects BIND 9 versions 9.11.0 through 9.11.37, 9.16.0 through 9.16.50, 9.18.0 through 9.18.32, 9.20.0 through 9.20.4, 9.21.0 through 9.21.3, 9.11.3-S1 through 9.11.37-S1, 9.16.8-S1 through 9.16.50-S1, and 9.18.11-S1 through 9.18.32-S1.

CVSS3: 7.5
1%
Низкий
12 месяцев назад
nvd логотип
CVE-2024-11187

It is possible to construct a zone such that some queries to it will generate responses containing numerous records in the Additional section. An attacker sending many such queries can cause either the authoritative server itself or an independent resolver to use disproportionate resources processing the queries. Zones will usually need to have been deliberately crafted to attack this exposure. This issue affects BIND 9 versions 9.11.0 through 9.11.37, 9.16.0 through 9.16.50, 9.18.0 through 9.18.32, 9.20.0 through 9.20.4, 9.21.0 through 9.21.3, 9.11.3-S1 through 9.11.37-S1, 9.16.8-S1 through 9.16.50-S1, and 9.18.11-S1 through 9.18.32-S1.

CVSS3: 7.5
1%
Низкий
12 месяцев назад
msrc логотип
CVSS3: 7.5
1%
Низкий
6 месяцев назад
debian логотип
CVE-2024-11187

It is possible to construct a zone such that some queries to it will g ...

CVSS3: 7.5
1%
Низкий
12 месяцев назад
github логотип
GHSA-gf34-2fpp-vmc4

Clients using DNS-over-HTTPS (DoH) can exhaust a DNS resolver's CPU and/or memory by flooding it with crafted valid or invalid HTTP/2 traffic. This issue affects BIND 9 versions 9.18.0 through 9.18.32, 9.20.0 through 9.20.4, 9.21.0 through 9.21.3, and 9.18.11-S1 through 9.18.32-S1.

CVSS3: 7.5
0%
Низкий
12 месяцев назад
fstec логотип
BDU:2025-07734

Уязвимость реализации DoH сервера DNS BIND, связанная с выделением неограниченной памяти, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
0%
Низкий
12 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:0427-1

Security update for bind

1%
Низкий
11 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:0389-1

Security update for bind

1%
Низкий
11 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:0384-1

Security update for bind

1%
Низкий
11 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:0359-1

Security update for bind

1%
Низкий
12 месяцев назад

Уязвимостей на страницу