BIND Product Security Update Advisory

Post a Comment

Overview

 

BIND has released an update to address a vulnerability in their product. Users of affected versions are advised to update to the latest version.

 

Affected Products

 

CVE-2024-0760

  • BIND 9 versions: 9.18.1 (inclusive) ~ 9.18.27 (inclusive)
  • BIND 9 versions: 9.19.0 (inclusive) ~ 9.19.24 (inclusive)

 

  • BIND Supported Preview Edition versions: 9.18.11-S1 (inclusive) ~ 9.18.27-S1 (inclusive)

 

CVE-2024-1975

  • BIND 9 versions: 9.0.0 (inclusive) ~ 9.11.37 (inclusive)
  • BIND 9 versions: 9.16.0 (inclusive) ~ 9.16.50 (inclusive)
  • BIND 9 versions: 9.18.0 (inclusive) ~ 9.18.27 (inclusive)
  • BIND 9 versions: 9.19.0 (inclusive) ~ 9.19.24 (inclusive)

 

  • BIND Supported Preview Edition versions: 9.9.3-S1 (inclusive) ~ 9.11.37-S1 (inclusive)
  • BIND Supported Preview Edition versions: 9.16.8-S1 (inclusive) ~ 9.16.49-S1 (inclusive)
  • BIND Supported Preview Edition versions: 9.18.11-S1 (inclusive) ~ 9.18.27-S1 (inclusive)

 

CVE-2024-4076

  • BIND 9 versions: 9.16.13 (inclusive) ~ 9.16.50 (inclusive)
  • BIND 9 versions: 9.18.0 (inclusive) ~ 9.18.27 (inclusive)
  • BIND 9 versions: 9.19.0 (inclusive) ~ 9.19.24 (inclusive)

 

  • BIND Supported Preview Edition versions: 9.11.33-S1 (inclusive) ~ 9.11.37-S1 (inclusive)
  • BIND Supported Preview Edition versions: 9.16.13-S1 (inclusive) ~ 9.16.50-S1 (inclusive)
  • BIND Supported Preview Edition versions: 9.18.11-S1 (inclusive) ~ 9.18.27-S1 (inclusive)

 

CVE-2024-1737

  • BIND 9 versions: 9.11.0 (inclusive) ~ 9.11.37 (inclusive)
  • BIND 9 versions: 9.16.0 (inclusive) ~ 9.16.50 (inclusive)
  • BIND 9 versions: 9.18.0 (inclusive) ~ 9.18.27 (inclusive)
  • BIND 9 versions: 9.19.0 (inclusive) ~ 9.19.24 (inclusive)

 

  • BIND Supported Preview Edition versions: 9.11.4-S1 (inclusive) ~ 9.11.37-S1 (inclusive)
  • BIND Supported Preview Edition versions: 9.16.8-S1 (inclusive) ~ 9.16.50-S1 (inclusive)
  • BIND Supported Preview Edition versions: 9.18.11-S1 (inclusive) ~ 9.18.27-S1 (inclusive)

 

 

Resolved Vulnerabilities

Vulnerability that could cause server instability due to flooding of DNS messages over TCP (CVE-2024-0760)
Vulnerability that could allow a client to exhaust resolver CPU resources by sending a stream of SIG(0) signature requests (CVE-2024-1975)
Vulnerability where a client query that triggers the serving of stale data and requires a lookup in local authorization zone data could result in an assertion failure (CVE-2024-4076)
Resolver caches and authorization zone databases that hold a large number of records for a hostname could experience performance degradation when adding or updating content and processing client queries (CVE-2024-1737)

 

 

Vulnerability Patches

Vulnerability patches have been made available in the latest update. Please follow the instructions on the Referenced Sites[1] to update to the latest Vulnerability Patches version.

 

CVE-2024-0760, CVE-2024-1975, CVE-2024-4076, CVE-2024-1737

  • BIND 9 version: 9.18.28
  • BIND 9 version: 9.20.0

 

  • BIND Supported Preview Edition version: 9.18.28-S1

 

 

Referenced Sites
 

[1] CVE-2024-0760 Detail

https://nvd.nist.gov/vuln/detail/CVE-2024-0760

[2] CVE-2024-0760: A flood of DNS messages over TCP may make the server unstable

https://kb.isc.org/docs/cve-2024-0760

[3] CVE-2024-1975 Detail

https://nvd.nist.gov/vuln/detail/CVE-2024-1975

[4] CVE-2024-1975: SIG(0) can be used to exhaust CPU resources

https://kb.isc.org/docs/cve-2024-1975

[5] CVE-2024-4076 Detail

cVE-2024-4076: SIG(0) can be used to exhaust CPU resources https://nvd.nist.gov/vuln/detail/CVE-2024-4076

[6] CVE-2024-4076: Assertion failure when serving both stale cache data and authoritative zone content

https://kb.isc.org/docs/cve-2024-4076

[7] CVE-2024-1737 Detail

https://nvd.nist.gov/vuln/detail/CVE-2024-1737

[8] CVE-2024-1737: BIND’s database will be slow if a very large number of RRs exist at the same name

https://kb.isc.org/docs/cve-2024-1737

Article Link: https://atcptest.wpcomstaging.com/en/79804/

1 post - 1 participant

Read full topic



Malware Analysis, News and Indicators - Latest topics
Sp123
"The real threat is actually not when the computer begins to think like a human, but when humans begin to think like computers."

Post a Comment