7.5

CVE-2024-11187

It is possible to construct a zone such that some queries to it will generate responses containing numerous records in the Additional section. An attacker sending many such queries can cause either the authoritative server itself or an independent resolver to use disproportionate resources processing the queries. Zones will usually need to have been deliberately crafted to attack this exposure.
This issue affects BIND 9 versions 9.11.0 through 9.11.37, 9.16.0 through 9.16.50, 9.18.0 through 9.18.32, 9.20.0 through 9.20.4, 9.21.0 through 9.21.3, 9.11.3-S1 through 9.11.37-S1, 9.16.8-S1 through 9.16.50-S1, and 9.18.11-S1 through 9.18.32-S1.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorISC
Product BIND 9
Default Statusunaffected
Version <= 9.11.37
Version 9.11.0
Status affected
Version <= 9.16.50
Version 9.16.0
Status affected
Version <= 9.18.32
Version 9.18.0
Status affected
Version <= 9.20.4
Version 9.20.0
Status affected
Version <= 9.21.3
Version 9.21.0
Status affected
Version <= 9.11.37-S1
Version 9.11.3-S1
Status affected
Version <= 9.16.50-S1
Version 9.16.8-S1
Status affected
Version <= 9.18.32-S1
Version 9.18.11-S1
Status affected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.55% 0.67
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
security-officer@isc.org 7.5 3.9 3.6
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CWE-405 Asymmetric Resource Consumption (Amplification)

The product does not properly control situations in which an adversary can cause the product to consume or produce excessive resources without requiring the adversary to invest equivalent work or otherwise prove authorization, i.e., the adversary's influence is "asymmetric."