7.5
CVE-2024-11187
- EPSS 0.55%
- Published 29.01.2025 22:15:28
- Last modified 11.02.2025 19:15:12
- Source security-officer@isc.org
- Teams watchlist Login
- Open Login
It is possible to construct a zone such that some queries to it will generate responses containing numerous records in the Additional section. An attacker sending many such queries can cause either the authoritative server itself or an independent resolver to use disproportionate resources processing the queries. Zones will usually need to have been deliberately crafted to attack this exposure. This issue affects BIND 9 versions 9.11.0 through 9.11.37, 9.16.0 through 9.16.50, 9.18.0 through 9.18.32, 9.20.0 through 9.20.4, 9.21.0 through 9.21.3, 9.11.3-S1 through 9.11.37-S1, 9.16.8-S1 through 9.16.50-S1, and 9.18.11-S1 through 9.18.32-S1.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorISC
≫
Product
BIND 9
Default Statusunaffected
Version <=
9.11.37
Version
9.11.0
Status
affected
Version <=
9.16.50
Version
9.16.0
Status
affected
Version <=
9.18.32
Version
9.18.0
Status
affected
Version <=
9.20.4
Version
9.20.0
Status
affected
Version <=
9.21.3
Version
9.21.0
Status
affected
Version <=
9.11.37-S1
Version
9.11.3-S1
Status
affected
Version <=
9.16.50-S1
Version
9.16.8-S1
Status
affected
Version <=
9.18.32-S1
Version
9.18.11-S1
Status
affected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.55% | 0.67 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
security-officer@isc.org | 7.5 | 3.9 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
|
CWE-405 Asymmetric Resource Consumption (Amplification)
The product does not properly control situations in which an adversary can cause the product to consume or produce excessive resources without requiring the adversary to invest equivalent work or otherwise prove authorization, i.e., the adversary's influence is "asymmetric."