CVE-2026-1519
- EPSS 0.03%
- Veröffentlicht 25.03.2026 13:25:19
- Zuletzt bearbeitet 13.04.2026 10:16:11
If a BIND resolver is performing DNSSEC validation and encounters a maliciously crafted zone, the resolver may consume excessive CPU. Authoritative-only servers are generally unaffected, although there are circumstances where authoritative servers ma...
CVE-2025-13878
- EPSS 0.04%
- Veröffentlicht 21.01.2026 14:43:27
- Zuletzt bearbeitet 15.04.2026 00:35:42
Malformed BRID/HHIT records can cause `named` to terminate unexpectedly. This issue affects BIND 9 versions 9.18.40 through 9.18.43, 9.20.13 through 9.20.17, 9.21.12 through 9.21.16, 9.18.40-S1 through 9.18.43-S1, and 9.20.13-S1 through 9.20.17-S1.
CVE-2025-40777
- EPSS 0.1%
- Veröffentlicht 16.07.2025 17:38:06
- Zuletzt bearbeitet 15.04.2026 00:35:42
If a `named` caching resolver is configured with `serve-stale-enable` `yes`, and with `stale-answer-client-timeout` set to `0` (the only allowable value other than `disabled`), and if the resolver, in the process of resolving a query, encounters a CN...
CVE-2024-11187
- EPSS 4.07%
- Veröffentlicht 29.01.2025 22:15:28
- Zuletzt bearbeitet 15.04.2026 00:35:42
It is possible to construct a zone such that some queries to it will generate responses containing numerous records in the Additional section. An attacker sending many such queries can cause either the authoritative server itself or an independent re...
CVE-2024-12705
- EPSS 5.62%
- Veröffentlicht 29.01.2025 22:15:28
- Zuletzt bearbeitet 15.04.2026 00:35:42
Clients using DNS-over-HTTPS (DoH) can exhaust a DNS resolver's CPU and/or memory by flooding it with crafted valid or invalid HTTP/2 traffic. This issue affects BIND 9 versions 9.18.0 through 9.18.32, 9.20.0 through 9.20.4, 9.21.0 through 9.21.3, an...
CVE-2024-4076
- EPSS 0.11%
- Veröffentlicht 23.07.2024 15:15:05
- Zuletzt bearbeitet 15.04.2026 00:35:42
Client queries that trigger serving stale data and that also require lookups in local authoritative zone data may result in an assertion failure. This issue affects BIND 9 versions 9.16.13 through 9.16.50, 9.18.0 through 9.18.27, 9.19.0 through 9.19....
CVE-2024-0760
- EPSS 16.69%
- Veröffentlicht 23.07.2024 15:15:03
- Zuletzt bearbeitet 15.04.2026 00:35:42
A malicious client can send many DNS messages over TCP, potentially causing the server to become unstable while the attack is in progress. The server may recover after the attack ceases. Use of ACLs will not mitigate the attack. This issue affects B...
CVE-2024-1737
- EPSS 0.28%
- Veröffentlicht 23.07.2024 15:15:03
- Zuletzt bearbeitet 15.04.2026 00:35:42
Resolver caches and authoritative zone databases that hold significant numbers of RRs for the same hostname (of any RTYPE) can suffer from degraded performance as content is being added or updated, and also when handling client queries for this name....
CVE-2024-1975
- EPSS 0.24%
- Veröffentlicht 23.07.2024 15:15:03
- Zuletzt bearbeitet 15.04.2026 00:35:42
If a server hosts a zone containing a "KEY" Resource Record, or a resolver DNSSEC-validates a "KEY" Resource Record from a DNSSEC-signed domain in cache, a client can exhaust resolver CPU resources by sending a stream of SIG(0) signed requests. This ...
CVE-2023-50387
- EPSS 51.99%
- Veröffentlicht 14.02.2024 16:15:45
- Zuletzt bearbeitet 04.11.2025 19:16:14
Certain DNSSEC aspects of the DNS protocol (in RFC 4033, 4034, 4035, 6840, and related RFCs) allow remote attackers to cause a denial of service (CPU consumption) via one or more DNSSEC responses, aka the "KeyTrap" issue. One of the concerns is that,...