First published: Tue Jul 23 2024(Updated: )
A malicious client can send many DNS messages over TCP, potentially causing the server to become unstable while the attack is in progress. The server may recover after the attack ceases. Use of ACLs will not mitigate the attack. This issue affects BIND 9 versions 9.18.1 through 9.18.27, 9.19.0 through 9.19.24, and 9.18.11-S1 through 9.18.27-S1.
Credit: security-officer@isc.org security-officer@isc.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/bind9 | 1:9.16.50-1~deb11u2 1:9.16.50-1~deb11u1 1:9.18.28-1~deb12u2 1:9.18.33-1~deb12u2 1:9.20.4-4 1:9.20.5-1 |
Upgrade to the patched release most closely related to your current version of BIND 9: 9.18.28, 9.20.0, or 9.18.28-S1.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-0760 is considered a high severity vulnerability due to its potential to cause instability in DNS servers under attack.
To fix CVE-2024-0760, upgrade to the fixed versions of BIND, specifically 1:9.16.50-1~deb11u2, 1:9.16.50-1~deb11u1, 1:9.18.28-1~deb12u2, or 1:9.20.4-3.
CVE-2024-0760 affects BIND 9 versions from 9.18.1 through 9.18, as well as earlier versions listed.
Using Access Control Lists (ACLs) will not mitigate the effects of CVE-2024-0760.
CVE-2024-0760 exploits the ability of a malicious client to overwhelm DNS servers with excessive TCP messages during an attack.