Lucene search

K
redosRedosROS-20240611-09
HistoryJun 11, 2024 - 12:00 a.m.

ROS-20240611-09

2024-06-1100:00:00
redos.red-soft.ru
bind dns server
assert() flaw
remote attacker
denial of service
dns protocol
unbounded distribution

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.1 High

AI Score

Confidence

High

0.05 Low

EPSS

Percentile

92.9%

A vulnerability in the BIND DNS server is related to a flaw in the use of assert(). Exploitation
vulnerability could allow an attacker acting remotely to cause a denial of service via the
named parameter during DNS64 and serve-stale interaction

A vulnerability in the named component of the DNS BIND server is related to a flaw in the use of the assert() function.
Exploitation of the vulnerability could allow an attacker acting remotely to cause a denial of service

A vulnerability in the named component of the DNS BIND server is related to uncontrolled resource consumption. Exploitation
exploitation of this vulnerability could allow a remote attacker to cause a denial of service.

Vulnerability in the DNSSEC component of the DNS protocol implementation of the DNS server BIND is related to algorithmic complexity and unbounded distribution.
complexity and unrestricted resource allocation when creating a DNS zone. Exploitation of the vulnerability could
Allow a remote attacker to cause a denial of service

OSVersionArchitecturePackageVersionFilename
redos7.3x86_64bind<= 9.18.24-5UNKNOWN

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.1 High

AI Score

Confidence

High

0.05 Low

EPSS

Percentile

92.9%