First published: Fri Jul 19 2024(Updated: )
ISC BIND is vulnerable to a denial of service, caused by an error when content is being added or updated in resolver caches and authoritative zone databases that hold significant numbers of RRs for the same hostname (of any RTYPE). By processing queries, a remote attacker could exploit this vulnerability to cause the database to slow down.
Credit: security-officer@isc.org security-officer@isc.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/bind9 | 1:9.16.50-1~deb11u2 1:9.16.50-1~deb11u1 1:9.18.28-1~deb12u2 1:9.18.33-1~deb12u2 1:9.20.4-4 1:9.20.5-1 |
Upgrade to the patched release most closely related to your current version of BIND 9: 9.18.28, 9.20.0, or 9.18.28-S1.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-1737 is rated as a moderate severity vulnerability due to performance degradation issues.
To fix CVE-2024-1737, update to the latest version of the BIND9 package that addresses the performance issues.
CVE-2024-1737 affects BIND9 versions 1:9.16.50-1~deb11u2, 1:9.16.50-1~deb11u1, 1:9.18.28-1~deb12u2, 1:9.20.4-3, and 1:9.20.4-4.
CVE-2024-1737 impacts systems running the BIND9 DNS server software.
While CVE-2024-1737 primarily affects performance, degraded responsiveness may lead to service availability issues.