First published: Wed Jan 29 2025(Updated: )
It is possible to construct a zone such that some queries to it will generate responses containing numerous records in the Additional section. An attacker sending many such queries can cause either the authoritative server itself or an independent resolver to use disproportionate resources processing the queries. Zones will usually need to have been deliberately crafted to attack this exposure.
Credit: security-officer@isc.org security-officer@isc.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/bind9 | <=1:9.16.50-1~deb11u2<=1:9.16.50-1~deb11u1<=1:9.18.28-1~deb12u2<=1:9.20.4-4 | 1:9.18.33-1~deb12u2 1:9.20.5-1 |
F5 BIG-IP and BIG-IQ Centralized Management | =17.5.0>=17.1.0<=17.1.2 | |
F5 BIG-IP and BIG-IQ Centralized Management | >=16.1.0<=16.1.5 | |
F5 BIG-IP and BIG-IQ Centralized Management | >=15.1.0<=15.1.10 |
Upgrade to the patched release most closely related to your current version of BIND 9: 9.18.33, 9.20.5, 9.21.4, or 9.18.33-S1.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-11187 has been classified with a high severity rating due to potential denial of service impacts.
To resolve CVE-2024-11187, upgrade to secure versions 1:9.18.33-1~deb12u2 or 1:9.20.5-1 of the bind9 package.
CVE-2024-11187 affects the bind9 package versions up to 1:9.16.50-1~deb11u2, 1:9.18.28-1~deb12u2, and 1:9.20.4-4.
Yes, CVE-2024-11187 can potentially be exploited remotely by attackers sending specially crafted queries.
Exploitation of CVE-2024-11187 may result in excessive resource consumption leading to service disruptions.