A malicious client can send many DNS messages over TCP, potentially causing the server to become unstable while the attack is in progress. The server may recover after the attack ceases. Use of ACLs will not mitigate the attack.
This issue affects BIND 9 versions 9.18.1 through 9.18.27, 9.19.0 through 9.19.24, and 9.18.11-S1 through 9.18.27-S1.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: isc
Published: 2024-07-23T14:26:54.983Z
Updated: 2024-08-13T20:36:51.162Z
Reserved: 2024-01-19T20:26:52.962Z
Link: CVE-2024-0760
Vulnrichment
Updated: 2024-08-01T18:18:18.515Z
NVD
Status : Awaiting Analysis
Published: 2024-07-23T15:15:03.520
Modified: 2024-08-01T13:45:59.803
Link: CVE-2024-0760
Redhat