CVE-2025-40777
- EPSS 0.02%
- Published 16.07.2025 17:38:06
- Last modified 17.07.2025 21:15:50
If a `named` caching resolver is configured with `serve-stale-enable` `yes`, and with `stale-answer-client-timeout` set to `0` (the only allowable value other than `disabled`), and if the resolver, in the process of resolving a query, encounters a CN...
CVE-2024-11187
- EPSS 0.55%
- Published 29.01.2025 22:15:28
- Last modified 11.02.2025 19:15:12
It is possible to construct a zone such that some queries to it will generate responses containing numerous records in the Additional section. An attacker sending many such queries can cause either the authoritative server itself or an independent re...
CVE-2024-12705
- EPSS 0.31%
- Published 29.01.2025 22:15:28
- Last modified 07.02.2025 17:15:30
Clients using DNS-over-HTTPS (DoH) can exhaust a DNS resolver's CPU and/or memory by flooding it with crafted valid or invalid HTTP/2 traffic. This issue affects BIND 9 versions 9.18.0 through 9.18.32, 9.20.0 through 9.20.4, 9.21.0 through 9.21.3, an...
CVE-2024-4076
- EPSS 0.11%
- Published 23.07.2024 15:15:05
- Last modified 21.11.2024 09:42:08
Client queries that trigger serving stale data and that also require lookups in local authoritative zone data may result in an assertion failure. This issue affects BIND 9 versions 9.16.13 through 9.16.50, 9.18.0 through 9.18.27, 9.19.0 through 9.19....
CVE-2024-0760
- EPSS 13%
- Published 23.07.2024 15:15:03
- Last modified 21.11.2024 08:47:18
A malicious client can send many DNS messages over TCP, potentially causing the server to become unstable while the attack is in progress. The server may recover after the attack ceases. Use of ACLs will not mitigate the attack. This issue affects B...
CVE-2024-1737
- EPSS 0.21%
- Published 23.07.2024 15:15:03
- Last modified 21.11.2024 08:51:11
Resolver caches and authoritative zone databases that hold significant numbers of RRs for the same hostname (of any RTYPE) can suffer from degraded performance as content is being added or updated, and also when handling client queries for this name....
CVE-2024-1975
- EPSS 0.18%
- Published 23.07.2024 15:15:03
- Last modified 21.11.2024 08:51:43
If a server hosts a zone containing a "KEY" Resource Record, or a resolver DNSSEC-validates a "KEY" Resource Record from a DNSSEC-signed domain in cache, a client can exhaust resolver CPU resources by sending a stream of SIG(0) signed requests. This ...
CVE-2023-50387
- EPSS 42.22%
- Published 14.02.2024 16:15:45
- Last modified 12.05.2025 15:15:56
Certain DNSSEC aspects of the DNS protocol (in RFC 4033, 4034, 4035, 6840, and related RFCs) allow remote attackers to cause a denial of service (CPU consumption) via one or more DNSSEC responses, aka the "KeyTrap" issue. One of the concerns is that,...
CVE-2023-6516
- EPSS 0.19%
- Published 13.02.2024 14:15:46
- Last modified 21.11.2024 08:44:00
To keep its cache database efficient, `named` running as a recursive resolver occasionally attempts to clean up the database. It uses several methods, including some that are asynchronous: a small chunk of memory pointing to the cache element that ca...
CVE-2023-4408
- EPSS 0.3%
- Published 13.02.2024 14:15:45
- Last modified 14.03.2025 17:15:40
The DNS message parsing code in `named` includes a section whose computational complexity is overly high. It does not cause problems for typical DNS traffic, but crafted queries and responses may cause excessive CPU load on the affected `named` insta...