Show plain JSON{"dataType": "CVE_RECORD", "cveMetadata": {"cveId": "CVE-2024-4076", "assignerOrgId": "404fd4d2-a609-4245-b543-2c944a302a22", "state": "PUBLISHED", "assignerShortName": "isc", "dateReserved": "2024-04-23T13:59:44.699Z", "datePublished": "2024-07-23T14:40:57.256Z", "dateUpdated": "2025-02-13T17:53:23.437Z"}, "containers": {"cna": {"providerMetadata": {"orgId": "404fd4d2-a609-4245-b543-2c944a302a22", "shortName": "isc", "dateUpdated": "2024-07-31T11:05:58.936Z"}, "title": "Assertion failure when serving both stale cache data and authoritative zone content", "datePublic": "2024-07-23T00:00:00.000Z", "affected": [{"vendor": "ISC", "product": "BIND 9", "versions": [{"version": "9.16.13", "lessThanOrEqual": "9.16.50", "status": "affected", "versionType": "custom"}, {"version": "9.18.0", "lessThanOrEqual": "9.18.27", "status": "affected", "versionType": "custom"}, {"version": "9.19.0", "lessThanOrEqual": "9.19.24", "status": "affected", "versionType": "custom"}, {"version": "9.11.33-S1", "lessThanOrEqual": "9.11.37-S1", "status": "affected", "versionType": "custom"}, {"version": "9.16.13-S1", "lessThanOrEqual": "9.16.50-S1", "status": "affected", "versionType": "custom"}, {"version": "9.18.11-S1", "lessThanOrEqual": "9.18.27-S1", "status": "affected", "versionType": "custom"}], "defaultStatus": "unaffected"}], "metrics": [{"cvssV3_1": {"version": "3.1", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "baseScore": 7.5, "baseSeverity": "HIGH"}}], "descriptions": [{"lang": "en", "value": "Client queries that trigger serving stale data and that also require lookups in local authoritative zone data may result in an assertion failure.\nThis issue affects BIND 9 versions 9.16.13 through 9.16.50, 9.18.0 through 9.18.27, 9.19.0 through 9.19.24, 9.11.33-S1 through 9.11.37-S1, 9.16.13-S1 through 9.16.50-S1, and 9.18.11-S1 through 9.18.27-S1."}], "impacts": [{"descriptions": [{"lang": "en", "value": "A `named` instance vulnerable to this logic error may terminate unexpectedly."}]}], "workarounds": [{"lang": "en", "value": "Disabling serve-stale answers mitigates this issue."}], "exploits": [{"lang": "en", "value": "We are not aware of any active exploits."}], "solutions": [{"lang": "en", "value": "Upgrade to the patched release most closely related to your current version of BIND 9: 9.18.28, 9.20.0, or 9.18.28-S1."}], "credits": [{"lang": "en", "value": "ISC would like to thank Daniel Str\u00e4nger for bringing this vulnerability to our attention."}], "references": [{"url": "https://kb.isc.org/docs/cve-2024-4076", "name": "CVE-2024-4076", "tags": ["vendor-advisory"]}, {"url": "http://www.openwall.com/lists/oss-security/2024/07/23/1"}, {"url": "http://www.openwall.com/lists/oss-security/2024/07/31/2"}], "source": {"discovery": "EXTERNAL"}}, "adp": [{"problemTypes": [{"descriptions": [{"type": "CWE", "cweId": "CWE-617", "lang": "en", "description": "CWE-617 Reachable Assertion"}]}], "affected": [{"vendor": "isc", "product": "bind", "cpes": ["cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*"], "defaultStatus": "unknown", "versions": [{"version": "9.16.13", "status": "affected", "lessThanOrEqual": "9.16.50", "versionType": "custom"}, {"version": "9.18.0", "status": "affected", "lessThanOrEqual": "9.18.27", "versionType": "custom"}, {"version": "9.19.0", "status": "affected", "lessThanOrEqual": "9.19.24", "versionType": "custom"}, {"version": "9.11.33-s1", "status": "affected", "lessThanOrEqual": "9.11.37-s1", "versionType": "custom"}, {"version": "9.16.13-s1", "status": "affected", "lessThanOrEqual": "9.16.50-s1", "versionType": "custom"}, {"version": "9.18.11-s1", "status": "affected", "lessThanOrEqual": "9.18.27-s1", "versionType": "custom"}]}], "metrics": [{"other": {"type": "ssvc", "content": {"timestamp": "2024-07-23T15:10:37.488270Z", "id": "CVE-2024-4076", "options": [{"Exploitation": "none"}, {"Automatable": "yes"}, {"Technical Impact": "partial"}], "role": "CISA Coordinator", "version": "2.0.3"}}}], "title": "CISA ADP Vulnrichment", "providerMetadata": {"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2024-07-24T18:47:06.657Z"}}, {"title": "CVE Program Container", "references": [{"url": "https://security.netapp.com/advisory/ntap-20240731-0001/"}, {"url": "https://kb.isc.org/docs/cve-2024-4076", "name": "CVE-2024-4076", "tags": ["vendor-advisory", "x_transferred"]}, {"url": "http://www.openwall.com/lists/oss-security/2024/07/23/1", "tags": ["x_transferred"]}], "providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-01T20:33:51.640Z"}}]}, "dataVersion": "5.1"}