cve-2024-8418
Vulnerability from cvelistv5
Published
2024-09-04 14:24
Modified
2024-09-05 14:49
Severity
Summary
Containers/aardvark-dns: tcp query handling flaw in aardvark-dns leading to denial of service
References
Source | URL | Tags |
---|---|---|
secalert@redhat.com | https://access.redhat.com/security/cve/CVE-2024-8418 | Third Party Advisory |
secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=2309683 | Issue Tracking |
secalert@redhat.com | https://github.com/containers/aardvark-dns/issues/500 | Exploit, Issue Tracking |
secalert@redhat.com | https://github.com/containers/aardvark-dns/pull/503 | Issue Tracking |
Impacted products
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-8418", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-04T15:21:26.948674Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-04T15:21:37.784Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:enterprise_linux:8" ], "defaultStatus": "unknown", "packageName": "container-tools:rhel8/aardvark-dns", "product": "Red Hat Enterprise Linux 8", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:enterprise_linux:8" ], "defaultStatus": "unknown", "packageName": "container-tools:rhel8/containers-common", "product": "Red Hat Enterprise Linux 8", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:enterprise_linux:9" ], "defaultStatus": "unknown", "packageName": "aardvark-dns", "product": "Red Hat Enterprise Linux 9", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:enterprise_linux:9" ], "defaultStatus": "unknown", "packageName": "containers-common", "product": "Red Hat Enterprise Linux 9", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:openshift:4" ], "defaultStatus": "unknown", "packageName": "rhcos", "product": "Red Hat OpenShift Container Platform 4", "vendor": "Red Hat" } ], "datePublic": "2024-09-04T10:00:00+00:00", "descriptions": [ { "lang": "en", "value": "A flaw was found in Aardvark-dns versions 1.12.0 and 1.12.1. They contain a denial of service vulnerability due to serial processing of TCP DNS queries. This flaw allows a malicious client to keep a TCP connection open indefinitely, causing other DNS queries to time out and resulting in a denial of service for all other containers using aardvark-dns." } ], "metrics": [ { "other": { "content": { "namespace": "https://access.redhat.com/security/updates/classification/", "value": "Moderate" }, "type": "Red Hat severity rating" } }, { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "Uncontrolled Resource Consumption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-05T14:49:19.028Z", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "vdb-entry", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/security/cve/CVE-2024-8418" }, { "name": "RHBZ#2309683", "tags": [ "issue-tracking", "x_refsource_REDHAT" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309683" }, { "url": "https://github.com/containers/aardvark-dns/issues/500" }, { "url": "https://github.com/containers/aardvark-dns/pull/503" } ], "timeline": [ { "lang": "en", "time": "2024-09-03T00:00:00+00:00", "value": "Reported to Red Hat." }, { "lang": "en", "time": "2024-09-04T10:00:00+00:00", "value": "Made public." } ], "title": "Containers/aardvark-dns: tcp query handling flaw in aardvark-dns leading to denial of service", "x_redhatCweChain": "CWE-400: Uncontrolled Resource Consumption" } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2024-8418", "datePublished": "2024-09-04T14:24:03.276Z", "dateReserved": "2024-09-04T10:38:07.126Z", "dateUpdated": "2024-09-05T14:49:19.028Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2024-8418\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2024-09-04T15:15:15.773\",\"lastModified\":\"2024-09-05T14:18:49.537\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A flaw was found in Aardvark-dns versions 1.12.0 and 1.12.1. They contain a denial of service vulnerability due to serial processing of TCP DNS queries. This flaw allows a malicious client to keep a TCP connection open indefinitely, causing other DNS queries to time out and resulting in a denial of service for all other containers using aardvark-dns.\"},{\"lang\":\"es\",\"value\":\"Se encontr\u00f3 una falla en las versiones 1.12.0 y 1.12.1 de Aardvark-dns. Contienen una vulnerabilidad de denegaci\u00f3n de servicio debido al procesamiento en serie de consultas DNS TCP. Esta falla permite que un cliente malintencionado mantenga una conexi\u00f3n TCP abierta indefinidamente, lo que hace que se agote el tiempo de espera de otras consultas DNS y se produzca una denegaci\u00f3n de servicio para todos los dem\u00e1s contenedores que utilicen aardvark-dns.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6},{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]},{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-400\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:containers:aardvark-dns:1.12.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"500D2E84-A5C1-452D-92B3-5F72EA9A3B65\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:containers:aardvark-dns:1.12.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B571A31D-435C-4048-8F0B-06502F177D7C\"}]}]}],\"references\":[{\"url\":\"https://access.redhat.com/security/cve/CVE-2024-8418\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=2309683\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\"]},{\"url\":\"https://github.com/containers/aardvark-dns/issues/500\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Exploit\",\"Issue Tracking\"]},{\"url\":\"https://github.com/containers/aardvark-dns/pull/503\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\"]}]}}" } }
Loading...