CVE-2024-12705

Clients using DNS-over-HTTPS (DoH) can exhaust a DNS resolver's CPU and/or memory by flooding it with crafted valid or invalid HTTP/2 traffic. This issue affects BIND 9 versions 9.18.0 through 9.18.32, 9.20.0 through 9.20.4, 9.21.0 through 9.21.3, and 9.18.11-S1 through 9.18.32-S1.
Configurations

No configuration.

History

07 Feb 2025, 17:15

Type Values Removed Values Added
Summary
  • (es) Los clientes que utilizan DNS sobre HTTPS (DoH) pueden agotar la CPU o la memoria de un solucionador de DNS inundándolo con tráfico HTTP/2 válido o no válido manipulado. Este problema afecta a las versiones de BIND 9 9.18.0 a 9.18.32, 9.20.0 a 9.20.4, 9.21.0 a 9.21.3 y 9.18.11-S1 a 9.18.32-S1.
References
  • () https://security.netapp.com/advisory/ntap-20250207-0003/ -

29 Jan 2025, 22:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-01-29 22:15

Updated : 2025-02-07 17:15


NVD link : CVE-2024-12705

Mitre link : CVE-2024-12705

CVE.ORG link : CVE-2024-12705


JSON object : View

Products Affected

No product.

CWE
CWE-770

Allocation of Resources Without Limits or Throttling