Lucene search

K
redosRedosROS-20240807-10
HistoryAug 07, 2024 - 12:00 a.m.

ROS-20240807-10

2024-08-0700:00:00
redos.red-soft.ru
5
bind dns
server
vulnerability
denial of service
uncontrolled resource consumption
remote exploitation
cpu resources
sig(0) signature

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

6.6

Confidence

Low

BIND DNS server vulnerability is related to uncontrolled resource consumption. Exploitation of the vulnerability could
allow an attacker acting remotely to cause a denial of service by sending multiple
DNS messages over TCP

The BIND DNS server vulnerability involves sending a large number of client requests that
trigger maintenance of outdated data and that also require a lookup in the local authoritative zone data.
zone. Exploitation of the vulnerability could allow an attacker acting remotely to cause a denial of
denial of service

The BIND DNS server vulnerability is related to unrestricted resource allocation. Exploitation of the vulnerability
could allow an attacker acting remotely to cause a denial of service when there are a large
Resource Records (RR, Resource Records) for the same domain name

The BIND DNS server vulnerability is related to the exhaustion of the recognizer’s CPU resources by sending a stream of queries with the
SIG(0) signature. Exploitation of the vulnerability could allow an attacker acting remotely to cause a
denial of service

OSVersionArchitecturePackageVersionFilename
redos7.3x86_64bind< 9.18.28-1UNKNOWN

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

6.6

Confidence

Low