Overview
BIND has released an update to address a vulnerability in their product. Users of affected versions are advised to update to the latest version.
Affected Products
CVE-2024-0760
- BIND 9 versions: 9.18.1 (inclusive) ~ 9.18.27 (inclusive)
- BIND 9 versions: 9.19.0 (inclusive) ~ 9.19.24 (inclusive)
- BIND Supported Preview Edition versions: 9.18.11-S1 (inclusive) ~ 9.18.27-S1 (inclusive)
CVE-2024-1975
- BIND 9 versions: 9.0.0 (inclusive) ~ 9.11.37 (inclusive)
- BIND 9 versions: 9.16.0 (inclusive) ~ 9.16.50 (inclusive)
- BIND 9 versions: 9.18.0 (inclusive) ~ 9.18.27 (inclusive)
- BIND 9 versions: 9.19.0 (inclusive) ~ 9.19.24 (inclusive)
- BIND Supported Preview Edition versions: 9.9.3-S1 (inclusive) ~ 9.11.37-S1 (inclusive)
- BIND Supported Preview Edition versions: 9.16.8-S1 (inclusive) ~ 9.16.49-S1 (inclusive)
- BIND Supported Preview Edition versions: 9.18.11-S1 (inclusive) ~ 9.18.27-S1 (inclusive)
CVE-2024-4076
- BIND 9 versions: 9.16.13 (inclusive) ~ 9.16.50 (inclusive)
- BIND 9 versions: 9.18.0 (inclusive) ~ 9.18.27 (inclusive)
- BIND 9 versions: 9.19.0 (inclusive) ~ 9.19.24 (inclusive)
- BIND Supported Preview Edition versions: 9.11.33-S1 (inclusive) ~ 9.11.37-S1 (inclusive)
- BIND Supported Preview Edition versions: 9.16.13-S1 (inclusive) ~ 9.16.50-S1 (inclusive)
- BIND Supported Preview Edition versions: 9.18.11-S1 (inclusive) ~ 9.18.27-S1 (inclusive)
CVE-2024-1737
- BIND 9 versions: 9.11.0 (inclusive) ~ 9.11.37 (inclusive)
- BIND 9 versions: 9.16.0 (inclusive) ~ 9.16.50 (inclusive)
- BIND 9 versions: 9.18.0 (inclusive) ~ 9.18.27 (inclusive)
- BIND 9 versions: 9.19.0 (inclusive) ~ 9.19.24 (inclusive)
- BIND Supported Preview Edition versions: 9.11.4-S1 (inclusive) ~ 9.11.37-S1 (inclusive)
- BIND Supported Preview Edition versions: 9.16.8-S1 (inclusive) ~ 9.16.50-S1 (inclusive)
- BIND Supported Preview Edition versions: 9.18.11-S1 (inclusive) ~ 9.18.27-S1 (inclusive)
Resolved Vulnerabilities
Vulnerability that could cause server instability due to flooding of DNS messages over TCP (CVE-2024-0760)
Vulnerability that could allow a client to exhaust resolver CPU resources by sending a stream of SIG(0) signature requests (CVE-2024-1975)
Vulnerability where a client query that triggers the serving of stale data and requires a lookup in local authorization zone data could result in an assertion failure (CVE-2024-4076)
Resolver caches and authorization zone databases that hold a large number of records for a hostname could experience performance degradation when adding or updating content and processing client queries (CVE-2024-1737)
Vulnerability Patches
Vulnerability patches have been made available in the latest update. Please follow the instructions on the Referenced Sites[1] to update to the latest Vulnerability Patches version.
CVE-2024-0760, CVE-2024-1975, CVE-2024-4076, CVE-2024-1737
- BIND 9 version: 9.18.28
- BIND 9 version: 9.20.0
- BIND Supported Preview Edition version: 9.18.28-S1
Referenced Sites
[1] CVE-2024-0760 Detail
https://nvd.nist.gov/vuln/detail/CVE-2024-0760
[2] CVE-2024-0760: A flood of DNS messages over TCP may make the server unstable
https://kb.isc.org/docs/cve-2024-0760
[3] CVE-2024-1975 Detail
https://nvd.nist.gov/vuln/detail/CVE-2024-1975
[4] CVE-2024-1975: SIG(0) can be used to exhaust CPU resources
https://kb.isc.org/docs/cve-2024-1975
[5] CVE-2024-4076 Detail
[6] CVE-2024-4076: Assertion failure when serving both stale cache data and authoritative zone content
https://kb.isc.org/docs/cve-2024-4076
[7] CVE-2024-1737 Detail
https://nvd.nist.gov/vuln/detail/CVE-2024-1737
[8] CVE-2024-1737: BIND’s database will be slow if a very large number of RRs exist at the same name
https://kb.isc.org/docs/cve-2024-1737
Article Link: https://atcptest.wpcomstaging.com/en/79804/
1 post - 1 participant
Malware Analysis, News and Indicators - Latest topics
Post a Comment
Post a Comment