Bug 2309683 (CVE-2024-8418) - CVE-2024-8418 containers/aardvark-dns: TCP Query Handling Flaw in Aardvark-dns Leading to Denial of Service
Summary: CVE-2024-8418 containers/aardvark-dns: TCP Query Handling Flaw in Aardvark-dn...
Keywords:
Status: NEW
Alias: CVE-2024-8418
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2309686 2309687
Blocks:
TreeView+ depends on / blocked
 
Reported: 2024-09-04 10:57 UTC by OSIDB Bzimport
Modified: 2024-09-17 19:25 UTC (History)
0 users

Fixed In Version:
Doc Type: ---
Doc Text:
A flaw was found in Aardvark-dns, which is vulnerable to a Denial of Service attack due to the serial processing of TCP DNS queries. An attacker can exploit this flaw by keeping a TCP connection open indefinitely, causing the server to become unresponsive and resulting in other DNS queries timing out. This issue prevents legitimate users from accessing DNS services, thereby disrupting normal operations and causing service downtime.
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2024-09-04 10:57:43 UTC
The affected versions (1.12.0 and 1.12.1) of aardvark-dns introduced TCP support but processed DNS queries serially. This flaw can be exploited by a malicious client to maintain an open TCP connection indefinitely, resulting in a denial of service for other DNS queries.


Note You need to log in before you can comment on or make changes to this bug.