[SECURITY-L] CVE-2024-0760: A flood of DNS messages over TCP may make the server unstable

CSIRT Unicamp security em unicamp.br
Terça Julho 23 14:22:11 -03 2024


*Original: *https://kb.isc.org/docs/cve-2024-0760


*CVE:* CVE-2024-0760
<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0760>

*Title:* A flood of DNS messages over TCP may make the server unstable

*Document version:* 2.0

*Posting date:* 23 July 2024

*Program impacted:* BIND 9 <https://www.isc.org/bind/>

*Versions affected:*

BIND

   - 9.18.1 -> 9.18.27
   - 9.19.0 -> 9.19.24

(Versions prior to 9.18.1 were not assessed.)

BIND Supported Preview Edition

   - 9.18.11-S1 -> 9.18.27-S1

(Versions prior to 9.18.24-S1 were not assessed.)

*Severity:* High

*Exploitable:* Remotely

*Description:*

A malicious client can send many DNS messages over TCP, potentially causing
the server to become unstable while the attack is in progress. The server
may recover after the attack ceases. Use of ACLs will not mitigate the
attack.

*Impact:*

The server can become unresponsive until sometime after the attack ends.

*CVSS Score:* 7.5

*CVSS Vector:* CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

For more information on the Common Vulnerability Scoring System and to
obtain your specific environmental score please visit:
https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&version=3.1
.

*Workarounds:*

No workarounds known.

*Active exploits:*

This flaw was discovered in internal testing. We are not aware of any
active exploits.

*Solution:*

Upgrade to the patched release most closely related to your current version
of BIND 9:

   - 9.18.28
   - 9.20.0

BIND Supported Preview Edition is a special feature preview branch of BIND
provided to eligible ISC support customers.

   - 9.18.28-S1

*Document revision history:*

   - 1.0 Early Notification, 10 July 2024
   - 1.1 Revised public disclosure date, 16 July 2024
   - 2.0 Public disclosure, 23 July 2024

*Related documents:*

See our BIND 9 Security Vulnerability Matrix
<https://kb.isc.org/docs/aa-00913> for a complete listing of security
vulnerabilities and versions affected.

*Do you still have questions?* Questions regarding this advisory should be
mailed to bind-security em isc.org or posted as confidential GitLab issues at
https://gitlab.isc.org/isc-projects/bind9/-/issues/new?issue[confidential]=true
.

*Note:*

ISC patches only currently supported versions. When possible we indicate
EOL versions affected. For current information on which versions are
actively supported, please see https://www.isc.org/download/.

*ISC Security Vulnerability Disclosure Policy:*

Details of our current security advisory policy and practice can be found
in the ISC Software Defect and Security Vulnerability Disclosure Policy at
https://kb.isc.org/docs/aa-00861.

The Knowledgebase article https://kb.isc.org/docs/cve-2024-0760 is the
complete and official security advisory document.

*Legal Disclaimer:*

Internet Systems Consortium (ISC) is providing this notice on an "AS IS"
basis. No warranty or guarantee of any kind is expressed in this notice and
none should be implied. ISC expressly excludes and disclaims any warranties
regarding this notice or materials referred to in this notice, including,
without limitation, any implied warranty of merchantability, fitness for a
particular purpose, absence of hidden defects, or of non-infringement. Your
use or reliance on this notice or materials referred to in this notice is
at your own risk. ISC may change this notice at any time. A stand-alone
copy or paraphrase of the text of this document that omits the document URL
is an uncontrolled copy. Uncontrolled copies may lack important
information, be out of date, or contain factual errors.
===
Computer Security Incident Response Team - CSIRT
Universidade Estadual de Campinas - Unicamp
Centro de Computacao - CCUEC
GnuPG Public Key: http://www.security.unicamp.br/security.asc [^]
Contato: +55 19 3521-2289 ou INOC-DBA: 1251*830
-------------- Próxima Parte ----------
Um anexo em HTML foi limpo...
URL: <http://www.listas.unicamp.br/pipermail/security-l/attachments/20240723/8e587227/attachment.html>


Mais detalhes sobre a lista de discussão SECURITY-L