![]() |
Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | ||
Test Kennung: | 1.3.6.1.4.1.25623.1.0.153893 |
Kategorie: | Denial of Service |
Titel: | ISC BIND DoS Vulnerability (CVE-2024-12705) - Linux |
Zusammenfassung: | ISC BIND is prone to a denial of service (DoS); vulnerability in the DNS-over-HTTPS implementation. |
Beschreibung: | Summary: ISC BIND is prone to a denial of service (DoS) vulnerability in the DNS-over-HTTPS implementation. Vulnerability Insight: Clients using DNS-over-HTTPS (DoH) can exhaust a DNS resolver's CPU and/or memory by flooding it with crafted valid or invalid HTTP/2 traffic. Vulnerability Impact: By flooding a target resolver with HTTP/2 traffic and exploiting this flaw, an attacker could overwhelm the server, causing high CPU and/or memory usage and preventing other clients from establishing DoH connections. This would significantly impair the resolver's performance and effectively deny legitimate clients access to the DNS resolution service. - Authoritative servers are affected by this vulnerability. - Resolvers are affected by this vulnerability. Affected Software/OS: ISC BIND version 9.18.0 through 9.18.32, 9.20.0 through 9.20.4, 9.21.0 through 9.21.3 and 9.18.11-S1 through 9.18.32-S1. Solution: Update to version 9.18.33, 9.20.5, 9.21.4, 9.18.33-S1 or later. CVSS Score: 7.8 CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C |
Querverweis: |
Common Vulnerability Exposure (CVE) ID: CVE-2024-12705 |
Copyright | Copyright (C) 2025 Greenbone AG |
Dies ist nur einer von 146377 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |