Warning from CISA Regarding Vulnerabilities in Well-Known BIND 9 DNS Software

Jul 25, 2024NewsroomDNS Security /Vulnerability

Patches have been released by the Internet Systems Consortium (ISC) to fix various security vulnerabilities in the Berkeley Internet Name Domain (BIND) 9 Domain Name System (DNS) software suite that

CISA Warns of Exploitable Vulnerabilities in Popular BIND 9 DNS Software

Jul 25, 2024NewsroomDNS Security /Vulnerability

CISA Warns of Exploitable Vulnerabilities in Popular BIND 9 DNS Software

Patches have been released by the Internet Systems Consortium (ISC) to fix various security vulnerabilities in the Berkeley Internet Name Domain (BIND) 9 Domain Name System (DNS) software suite that have the potential to be exploited in order to initiate a denial-of-service (DoS) scenario.

An advisory from the U.S. Cybersecurity and Infrastructure Security Agency (CISA) stated that “One of these vulnerabilities could lead to a denial-of-service situation.”

Cybersecurity

The following are the four vulnerabilities listed –

  • CVE-2024-4076 (CVSS score: 7.5) – An error in logic could result in an assertion failure due to lookups causing stale data to be served, necessitating lookups in local authoritative zone data
  • CVE-2024-1975 (CVSS score: 7.5) – The validation of DNS messages signed with the SIG(0) protocol could lead to excessive CPU usage, resulting in a denial-of-service state
  • CVE-2024-1737 (CVSS score: 7.5) – Crafting a large number of resource record types for a specific owner name can impede database processing
  • CVE-2024-0760 (CVSS score: 7.5) – Sending numerous queries over TCP without reading the responses as a malicious DNS client could slow down or halt server responses for other clients

Exploiting these bugs successfully could result in the abrupt termination of a named instance, exhaustion of available CPU resources, 100x slower query processing, and an unresponsive server.

The vulnerabilities have been fixed in BIND 9 versions 9.18.28, 9.20.0, and 9.18.28-S1 which were released earlier in the current month. There is no indication of any exploitation of these weaknesses in the wild.

The revelation follows the addressing by ISC of another flaw in BIND 9 known as KeyTrap (CVE-2023-50387, CVSS score: 7.5) which could be exploited to deplete CPU resources and cause DNS resolvers to stall, resulting in a denial-of-service (DoS) situation.

Enjoyed this article? Follow us on Twitter and LinkedIn for more exclusive content.

About Author

Subscribe To InfoSec Today News

You have successfully subscribed to the newsletter

There was an error while trying to send your request. Please try again.

World Wide Crypto will use the information you provide on this form to be in touch with you and to provide updates and marketing.