CVE-2024-12705

Name
CVE-2024-12705
Description
Clients using DNS-over-HTTPS (DoH) can exhaust a DNS resolver's CPU and/or memory by flooding it with crafted valid or invalid HTTP/2 traffic. This issue affects BIND 9 versions 9.18.0 through 9.18.32, 9.20.0 through 9.20.4, 9.21.0 through 9.21.3, and 9.18.11-S1 through 9.18.32-S1.
NVD Severity
unknown
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
vendor-advisory https://kb.isc.org/docs/cve-2024-12705
af854a3a-2127-422b-91ae-364da2661108 https://security.netapp.com/advisory/ntap-20250207-0003/

Match rules

CPE URI Source package Min version Max version
bind-9 >= 9.18.0 <= 9.18.32
bind-9 >= 9.20.0 <= 9.20.4
bind-9 >= 9.21.0 <= 9.21.3
bind-9 >= 9.18.11-S1 <= 9.18.32-S1

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
bind edge-main 9.18.33-r0 Mike Crute <mike@crute.us> fixed
bind 3.21-main 9.18.33-r0 Mike Crute <mike@crute.us> fixed
bind 3.20-main 9.18.33-r0 Mike Crute <mike@crute.us> fixed
bind 3.19-main 9.18.33-r0 Mike Crute <mike@crute.us> fixed
bind 3.18-main 9.18.33-r0 Mike Crute <mike@crute.us> fixed