1.0 Introduction
Recently, The Internet Systems Consortium (ISC) has released security advisories that address two critical vulnerabilities in its widely used Domain Name System (DNS) software, BIND, tracked as CVE-2024-11187 and CVE-2024-12705.
2.0 Impact
These vulnerabilities pose a serious risk of denial-of-service (DoS) attacks on both authoritative DNS servers and resolvers. Exploiting these flaws can lead to resource exhaustion, potentially disrupting the availability of DNS services, and preventing legitimate traffic from reaching targeted systems.
3.0 Affected Products
-
CVE-2024-12705: DNS-over-HTTPS implementation suffers from multiple issues under heavy query load
- BIND versions 9.18.0 through 9.18.32
- BIND versions 9.20.0 through 9.20.4
- BIND versions 9.21.0 through 9.21.3
- CVE-2024-11187: Many records in the additional section cause CPU exhaustion
- BIND versions 9.11.0 through 9.11.37
- BIND versions 9.16.0 through 9.16.50
- BIND versions 9.18.0 through 9.18.32
- BIND versions 9.20.0 through 9.20.4
- BIND version 9.21.0 through 9.21.3
4.0 Recommendations
CyberSecurity Malaysia encourages users and administrators to review the following
ISC advisories
and apply the necessary mitigations.
Kindly refer to the following URLs:
Generally, we advise the users to be updated with the latest security announcements by the vendor and follow best practice security policies to determine which updates should be applied.
For further enquiries, please contact us through the following channels:
E-mail: cyber999[at]cybersecurity.my
Phone: 1-300-88-2999 (monitored during business hours)
Mobile: +60 19 2665850 (24x7 call incident reporting)
Business Hours: Mon - Fri 08:30 -17:30 MYT
Web:
https://www.mycert.org.my
5.0 References