Lucene search

K
ubuntuUbuntuUSN-6909-1
HistoryJul 23, 2024 - 12:00 a.m.

Bind vulnerabilities

2024-07-2300:00:00
ubuntu.com
40
ubuntu 24.04 lts
ubuntu 22.04 lts
ubuntu 20.04 lts
bind9
denial of service
cve-2024-0760
cve-2024-1737
cve-2024-1975
cve-2024-4076
dns messages
resource consumption
sig(0) signed requests
unstable
cache data

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

7.2

Confidence

Low

EPSS

0.001

Percentile

20.9%

Releases

  • Ubuntu 24.04 LTS
  • Ubuntu 22.04 LTS
  • Ubuntu 20.04 LTS

Packages

  • bind9 - Internet Domain Name Server

Details

It was discovered that Bind incorrectly handled a flood of DNS messages
over TCP. A remote attacker could possibly use this issue to cause Bind to
become unstable, resulting in a denial of service. (CVE-2024-0760)

Toshifumi Sakaguchi discovered that Bind incorrectly handled having a very
large number of RRs existing at the same time. A remote attacker could
possibly use this issue to cause Bind to consume resources, leading to a
denial of service. (CVE-2024-1737)

It was discovered that Bind incorrectly handled a large number of SIG(0)
signed requests. A remote attacker could possibly use this issue to cause
Bind to consume resources, leading to a denial of service. (CVE-2024-1975)

Daniel StrΓ€nger discovered that Bind incorrectly handled serving both
stable cache data and authoritative zone content. A remote attacker could
possibly use this issue to cause Bind to crash, resulting in a denial of
service. (CVE-2024-4076)

On Ubuntu 20.04 LTS, Bind has been updated from 9.16 to 9.18. In addition
to security fixes, the updated packages contain bug fixes, new features,
and possibly incompatible changes.

Please see the following for more information:

<https://kb.isc.org/docs/changes-to-be-aware-of-when-moving-from-bind-916-to-918&gt;

OSVersionArchitecturePackageVersionFilename
Ubuntu24.04noarchbind9<Β 1:9.18.28-0ubuntu0.24.04.1UNKNOWN
Ubuntu24.04noarchbind9-dbgsym<Β 1:9.18.28-0ubuntu0.24.04.1UNKNOWN
Ubuntu24.04noarchbind9-dev<Β 1:9.18.28-0ubuntu0.24.04.1UNKNOWN
Ubuntu24.04noarchbind9-dnsutils<Β 1:9.18.28-0ubuntu0.24.04.1UNKNOWN
Ubuntu24.04noarchbind9-dnsutils-dbgsym<Β 1:9.18.28-0ubuntu0.24.04.1UNKNOWN
Ubuntu24.04noarchbind9-doc<Β 1:9.18.28-0ubuntu0.24.04.1UNKNOWN
Ubuntu24.04noarchbind9-host<Β 1:9.18.28-0ubuntu0.24.04.1UNKNOWN
Ubuntu24.04noarchbind9-host-dbgsym<Β 1:9.18.28-0ubuntu0.24.04.1UNKNOWN
Ubuntu24.04noarchbind9-libs<Β 1:9.18.28-0ubuntu0.24.04.1UNKNOWN
Ubuntu24.04noarchbind9-libs-dbgsym<Β 1:9.18.28-0ubuntu0.24.04.1UNKNOWN
Rows per page:
1-10 of 411

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

7.2

Confidence

Low

EPSS

0.001

Percentile

20.9%