WID-SEC-W-2024-1700
Vulnerability from csaf_certbund - Published: 2024-07-23 22:00 - Updated: 2025-02-11 23:00In Internet Systems Consortium BIND existieren mehrere Schwachstellen. Diese Fehler sind auf eine unsachgemäße Behandlung von DNS-Nachrichten, DNSSEC-Validierung und eine große Anzahl von Ressourcendatensätzen zurückzuführen, was zu Instabilität, Leistungseinbußen, Abstürzen und Assertion-Fehlern führt. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen.
In Internet Systems Consortium BIND existieren mehrere Schwachstellen. Diese Fehler sind auf eine unsachgemäße Behandlung von DNS-Nachrichten, DNSSEC-Validierung und eine große Anzahl von Ressourcendatensätzen zurückzuführen, was zu Instabilität, Leistungseinbußen, Abstürzen und Assertion-Fehlern führt. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen.
In Internet Systems Consortium BIND existieren mehrere Schwachstellen. Diese Fehler sind auf eine unsachgemäße Behandlung von DNS-Nachrichten, DNSSEC-Validierung und eine große Anzahl von Ressourcendatensätzen zurückzuführen, was zu Instabilität, Leistungseinbußen, Abstürzen und Assertion-Fehlern führt. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen.
In Internet Systems Consortium BIND existieren mehrere Schwachstellen. Diese Fehler sind auf eine unsachgemäße Behandlung von DNS-Nachrichten, DNSSEC-Validierung und eine große Anzahl von Ressourcendatensätzen zurückzuführen, was zu Instabilität, Leistungseinbußen, Abstürzen und Assertion-Fehlern führt. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen.
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "BIND (Berkeley Internet Name Domain) ist ein Open-Source-Softwarepaket, das einen Domain-Name-System-Server implementiert.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Internet Systems Consortium BIND ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Sonstiges\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-1700 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1700.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-1700 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1700"
},
{
"category": "external",
"summary": "OSS Security Mailing List vom 2024-07-23",
"url": "https://seclists.org/oss-sec/2024/q3/101"
},
{
"category": "external",
"summary": "BIND Security Advisory vom 2024-07-23",
"url": "https://kb.isc.org/docs/cve-2024-0760"
},
{
"category": "external",
"summary": "BIND Security Advisory vom 2024-07-23",
"url": "https://kb.isc.org/docs/cve-2024-1737"
},
{
"category": "external",
"summary": "BIND Security Advisory vom 2024-07-23",
"url": "https://kb.isc.org/docs/cve-2024-1975"
},
{
"category": "external",
"summary": "BIND Security Advisory vom 2024-07-23",
"url": "https://kb.isc.org/docs/cve-2024-4076"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6909-1 vom 2024-07-23",
"url": "https://ubuntu.com/security/notices/USN-6909-1"
},
{
"category": "external",
"summary": "Infoblox Advisory",
"url": "https://support.infoblox.com/s/article/000009904"
},
{
"category": "external",
"summary": "Infoblox Advisory",
"url": "https://support.infoblox.com/s/article/000009906"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-5734 vom 2024-07-26",
"url": "https://lists.debian.org/debian-security-announce/2024/msg00145.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2636-1 vom 2024-07-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-July/019038.html"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2024-8AF1780FDF vom 2024-07-31",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-8af1780fdf"
},
{
"category": "external",
"summary": "NetApp Security Advisory NTAP-20240731-0003 vom 2024-07-31",
"url": "https://security.netapp.com/advisory/ntap-20240731-0003/"
},
{
"category": "external",
"summary": "NetApp Security Advisory NTAP-20240731-0002 vom 2024-07-31",
"url": "https://security.netapp.com/advisory/ntap-20240731-0002/"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2024-56AE6C2C7A vom 2024-07-31",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-56ae6c2c7a"
},
{
"category": "external",
"summary": "NetApp Security Advisory NTAP-20240731-0001 vom 2024-07-31",
"url": "https://security.netapp.com/advisory/ntap-20240731-0001/"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2024-EF8A7031E7 vom 2024-08-01",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-ef8a7031e7"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6909-2 vom 2024-08-01",
"url": "https://ubuntu.com/security/notices/USN-6909-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2810-1 vom 2024-08-07",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019125.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2811-1 vom 2024-08-07",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019124.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2863-1 vom 2024-08-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019158.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2863-1 vom 2024-08-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019159.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2863-1 vom 2024-08-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019160.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2862-1 vom 2024-08-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019161.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2868-1 vom 2024-08-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019165.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:5231 vom 2024-08-12",
"url": "https://access.redhat.com/errata/RHSA-2024:5231"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2024-2616 vom 2024-08-13",
"url": "https://alas.aws.amazon.com/AL2/ALAS-2024-2616.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-5231 vom 2024-08-13",
"url": "https://linux.oracle.com/errata/ELSA-2024-5231.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:5390 vom 2024-08-15",
"url": "https://access.redhat.com/errata/RHSA-2024:5390"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-5390 vom 2024-08-14",
"url": "https://linux.oracle.com/errata/ELSA-2024-5390.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:5418 vom 2024-08-15",
"url": "https://access.redhat.com/errata/RHSA-2024:5418"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6909-3 vom 2024-08-15",
"url": "https://ubuntu.com/security/notices/USN-6909-3"
},
{
"category": "external",
"summary": "F5 Security Advisory K000140732 vom 2024-08-17",
"url": "https://my.f5.com/manage/s/article/K000140732"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:5524 vom 2024-08-19",
"url": "https://access.redhat.com/errata/RHSA-2024:5524"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:5525 vom 2024-08-19",
"url": "https://access.redhat.com/errata/RHSA-2024:5525"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-5524 vom 2024-08-20",
"url": "http://linux.oracle.com/errata/ELSA-2024-5524.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:5655 vom 2024-08-21",
"url": "https://access.redhat.com/errata/RHSA-2024:5655"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2024:5231 vom 2024-08-21",
"url": "https://errata.build.resf.org/RLSA-2024:5231"
},
{
"category": "external",
"summary": "F5 Security Advisory K000140745 vom 2024-08-22",
"url": "https://my.f5.com/manage/s/article/K000140745"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:5813 vom 2024-08-26",
"url": "https://access.redhat.com/errata/RHSA-2024:5813"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:5871 vom 2024-08-27",
"url": "https://access.redhat.com/errata/RHSA-2024:5871"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:5838 vom 2024-08-26",
"url": "https://access.redhat.com/errata/RHSA-2024:5838"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:5907 vom 2024-08-28",
"url": "https://access.redhat.com/errata/RHSA-2024:5907"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:5894 vom 2024-08-27",
"url": "https://access.redhat.com/errata/RHSA-2024:5894"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:5908 vom 2024-08-28",
"url": "https://access.redhat.com/errata/RHSA-2024:5908"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:5930 vom 2024-08-28",
"url": "https://access.redhat.com/errata/RHSA-2024:5930"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:6004 vom 2024-09-04",
"url": "https://access.redhat.com/errata/RHSA-2024:6004"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:6009 vom 2024-09-04",
"url": "https://access.redhat.com/errata/RHSA-2024:6009"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:6013 vom 2024-09-05",
"url": "https://access.redhat.com/errata/RHSA-2024:6013"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:6406 vom 2024-09-12",
"url": "https://access.redhat.com/errata/RHSA-2024:6406"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:6642 vom 2024-09-18",
"url": "https://access.redhat.com/errata/RHSA-2024:6642"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7168815 vom 2024-09-18",
"url": "https://www.ibm.com/support/pages/node/7168815"
},
{
"category": "external",
"summary": "Insyde Security Advisory INSYDE-SA-2024010 vom 2024-10-09",
"url": "https://www.insyde.com/security-pledge/SA-2024010"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2024-422 vom 2024-10-10",
"url": "https://www.dell.com/support/kbdoc/de-de/000234730/dsa-2024-422-security-update-for-dell-networker-vproxy-multiple-component-vulnerabilities"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-5930 vom 2024-10-15",
"url": "https://linux.oracle.com/errata/ELSA-2024-5930.html"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7176451 vom 2024-11-18",
"url": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory27.asc"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7176451 vom 2024-11-19",
"url": "https://www.ibm.com/support/pages/node/7176451"
},
{
"category": "external",
"summary": "XEROX Security Advisory XRX25-001 vom 2025-01-13",
"url": "https://securitydocs.business.xerox.com/wp-content/uploads/2025/01/Xerox-Security-Bulletin-XRX25-001-for-Xerox%C2%AE-FreeFlow%C2%AE-Print-Server-v9.pdf"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7181928 vom 2025-02-12",
"url": "https://www.ibm.com/support/pages/node/7181928"
}
],
"source_lang": "en-US",
"title": "Internet Systems Consortium BIND: Mehrere Schwachstellen erm\u00f6glichen Denial of Service",
"tracking": {
"current_release_date": "2025-02-11T23:00:00.000+00:00",
"generator": {
"date": "2025-02-12T11:11:21.836+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.10"
}
},
"id": "WID-SEC-W-2024-1700",
"initial_release_date": "2024-07-23T22:00:00.000+00:00",
"revision_history": [
{
"date": "2024-07-23T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2024-07-25T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2024-07-29T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-07-31T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Fedora und NetApp aufgenommen"
},
{
"date": "2024-08-01T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-08-06T22:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-08-08T22:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-08-11T22:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-08-12T22:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-08-13T22:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von Amazon und Oracle Linux aufgenommen"
},
{
"date": "2024-08-14T22:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von Red Hat und Oracle Linux aufgenommen"
},
{
"date": "2024-08-15T22:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-08-18T22:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von F5 und Red Hat aufgenommen"
},
{
"date": "2024-08-19T22:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2024-08-20T22:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-08-21T22:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen"
},
{
"date": "2024-08-22T22:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von F5 aufgenommen"
},
{
"date": "2024-08-25T22:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-08-26T22:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-08-27T22:00:00.000+00:00",
"number": "20",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-08-28T22:00:00.000+00:00",
"number": "21",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-09-03T22:00:00.000+00:00",
"number": "22",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-09-04T22:00:00.000+00:00",
"number": "23",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-09-05T22:00:00.000+00:00",
"number": "24",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-09-11T22:00:00.000+00:00",
"number": "25",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-09-17T22:00:00.000+00:00",
"number": "26",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-10-08T22:00:00.000+00:00",
"number": "27",
"summary": "Neue Updates von Insyde aufgenommen"
},
{
"date": "2024-10-09T22:00:00.000+00:00",
"number": "28",
"summary": "Neue Updates von Dell aufgenommen"
},
{
"date": "2024-10-14T22:00:00.000+00:00",
"number": "29",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2024-11-18T23:00:00.000+00:00",
"number": "30",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2025-01-12T23:00:00.000+00:00",
"number": "31",
"summary": "Neue Updates von XEROX aufgenommen"
},
{
"date": "2025-02-11T23:00:00.000+00:00",
"number": "32",
"summary": "Neue Updates von IBM aufgenommen"
}
],
"status": "final",
"version": "32"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "F5 BIG-IP",
"product": {
"name": "F5 BIG-IP",
"product_id": "T001663",
"product_identification_helper": {
"cpe": "cpe:/a:f5:big-ip:-"
}
}
},
{
"category": "product_version",
"name": "17.1.0-17.1.1",
"product": {
"name": "F5 BIG-IP 17.1.0-17.1.1",
"product_id": "T034899",
"product_identification_helper": {
"cpe": "cpe:/a:f5:big-ip:17.1.0_-_17.1.1"
}
}
},
{
"category": "product_version",
"name": "15.1.0-15.1.10",
"product": {
"name": "F5 BIG-IP 15.1.0-15.1.10",
"product_id": "T034902",
"product_identification_helper": {
"cpe": "cpe:/a:f5:big-ip:15.1.0_-_15.1.10"
}
}
},
{
"category": "product_version",
"name": "16.1.0-16.1.5",
"product": {
"name": "F5 BIG-IP 16.1.0-16.1.5",
"product_id": "T037028",
"product_identification_helper": {
"cpe": "cpe:/a:f5:big-ip:16.1.0_-_16.1.5"
}
}
}
],
"category": "product_name",
"name": "BIG-IP"
}
],
"category": "vendor",
"name": "F5"
},
{
"branches": [
{
"category": "product_name",
"name": "Fedora Linux",
"product": {
"name": "Fedora Linux",
"product_id": "74185",
"product_identification_helper": {
"cpe": "cpe:/o:fedoraproject:fedora:-"
}
}
}
],
"category": "vendor",
"name": "Fedora"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "7.3",
"product": {
"name": "IBM AIX 7.3",
"product_id": "1139691",
"product_identification_helper": {
"cpe": "cpe:/o:ibm:aix:7.3"
}
}
},
{
"category": "product_version",
"name": "7.2",
"product": {
"name": "IBM AIX 7.2",
"product_id": "434967",
"product_identification_helper": {
"cpe": "cpe:/o:ibm:aix:7.2"
}
}
},
{
"category": "product_name",
"name": "IBM AIX",
"product": {
"name": "IBM AIX",
"product_id": "T039245",
"product_identification_helper": {
"cpe": "cpe:/o:ibm:aix:-"
}
}
}
],
"category": "product_name",
"name": "AIX"
},
{
"branches": [
{
"category": "product_version",
"name": "V9000",
"product": {
"name": "IBM FlashSystem V9000",
"product_id": "T026925",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:flashsystem:v9000"
}
}
},
{
"category": "product_version",
"name": "9500",
"product": {
"name": "IBM FlashSystem 9500",
"product_id": "T026926",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:flashsystem:9500"
}
}
},
{
"category": "product_version",
"name": "9100 Family",
"product": {
"name": "IBM FlashSystem 9100 Family",
"product_id": "T026927",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:flashsystem:9100_family"
}
}
},
{
"category": "product_version",
"name": "9200",
"product": {
"name": "IBM FlashSystem 9200",
"product_id": "T026928",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:flashsystem:9200"
}
}
},
{
"category": "product_version",
"name": "7300",
"product": {
"name": "IBM FlashSystem 7300",
"product_id": "T026929",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:flashsystem:7300"
}
}
},
{
"category": "product_version",
"name": "7200",
"product": {
"name": "IBM FlashSystem 7200",
"product_id": "T026930",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:flashsystem:7200"
}
}
},
{
"category": "product_version",
"name": "5200",
"product": {
"name": "IBM FlashSystem 5200",
"product_id": "T026931",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:flashsystem:5200"
}
}
},
{
"category": "product_version",
"name": "5000",
"product": {
"name": "IBM FlashSystem 5000",
"product_id": "T026932",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:flashsystem:5000"
}
}
}
],
"category": "product_name",
"name": "FlashSystem"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c7.5.0 UP9 IF03",
"product": {
"name": "IBM QRadar SIEM \u003c7.5.0 UP9 IF03",
"product_id": "T037731"
}
},
{
"category": "product_version",
"name": "7.5.0 UP9 IF03",
"product": {
"name": "IBM QRadar SIEM 7.5.0 UP9 IF03",
"product_id": "T037731-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:qradar_siem:7.5.0_up9_if03"
}
}
}
],
"category": "product_name",
"name": "QRadar SIEM"
},
{
"category": "product_name",
"name": "IBM SAN Volume Controller",
"product": {
"name": "IBM SAN Volume Controller",
"product_id": "T020642",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:san_volume_controller:-"
}
}
},
{
"branches": [
{
"category": "product_version",
"name": "V5100",
"product": {
"name": "IBM Storwize V5100",
"product_id": "T020638",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:storwize:v5100"
}
}
},
{
"category": "product_version",
"name": "V5000",
"product": {
"name": "IBM Storwize V5000",
"product_id": "T020639",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:storwize:v5000"
}
}
},
{
"category": "product_version",
"name": "V5000E",
"product": {
"name": "IBM Storwize V5000E",
"product_id": "T026924",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:storwize:v5000e"
}
}
},
{
"category": "product_version",
"name": "V7000",
"product": {
"name": "IBM Storwize V7000",
"product_id": "T041141",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:storwize:v7000"
}
}
}
],
"category": "product_name",
"name": "Storwize"
},
{
"branches": [
{
"category": "product_version",
"name": "3.1",
"product": {
"name": "IBM VIOS 3.1",
"product_id": "1039165",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:vios:3.1"
}
}
},
{
"category": "product_version",
"name": "4.1",
"product": {
"name": "IBM VIOS 4.1",
"product_id": "1522854",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:vios:4.1"
}
}
}
],
"category": "product_name",
"name": "VIOS"
}
],
"category": "vendor",
"name": "IBM"
},
{
"branches": [
{
"category": "product_name",
"name": "Infoblox DDI",
"product": {
"name": "Infoblox DDI",
"product_id": "T022362",
"product_identification_helper": {
"cpe": "cpe:/a:infoblox:ddi:-"
}
}
},
{
"branches": [
{
"category": "product_version",
"name": "8.6.3",
"product": {
"name": "Infoblox NIOS 8.6.3",
"product_id": "T024812",
"product_identification_helper": {
"cpe": "cpe:/o:infoblox:nios:8.6.3"
}
}
},
{
"category": "product_version",
"name": "8.6.2",
"product": {
"name": "Infoblox NIOS 8.6.2",
"product_id": "T028256",
"product_identification_helper": {
"cpe": "cpe:/o:infoblox:nios:8.6.2"
}
}
},
{
"category": "product_version",
"name": "8.6.4",
"product": {
"name": "Infoblox NIOS 8.6.4",
"product_id": "T032852",
"product_identification_helper": {
"cpe": "cpe:/o:infoblox:nios:8.6.4"
}
}
},
{
"category": "product_version",
"name": "9.0.2",
"product": {
"name": "Infoblox NIOS 9.0.2",
"product_id": "T032853",
"product_identification_helper": {
"cpe": "cpe:/o:infoblox:nios:9.0.2"
}
}
},
{
"category": "product_version",
"name": "9.0.3",
"product": {
"name": "Infoblox NIOS 9.0.3",
"product_id": "T032854",
"product_identification_helper": {
"cpe": "cpe:/o:infoblox:nios:9.0.3"
}
}
},
{
"category": "product_version",
"name": "9.0.4",
"product": {
"name": "Infoblox NIOS 9.0.4",
"product_id": "T036441",
"product_identification_helper": {
"cpe": "cpe:/o:infoblox:nios:9.0.4"
}
}
}
],
"category": "product_name",
"name": "NIOS"
}
],
"category": "vendor",
"name": "Infoblox"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cRV23.08",
"product": {
"name": "Insyde UEFI Firmware \u003cRV23.08",
"product_id": "T038076"
}
},
{
"category": "product_version",
"name": "RV23.08",
"product": {
"name": "Insyde UEFI Firmware RV23.08",
"product_id": "T038076-fixed",
"product_identification_helper": {
"cpe": "cpe:/h:insyde:uefi:rv23.08"
}
}
},
{
"category": "product_version_range",
"name": "\u003cRV24.06",
"product": {
"name": "Insyde UEFI Firmware \u003cRV24.06",
"product_id": "T038077"
}
},
{
"category": "product_version",
"name": "RV24.06",
"product": {
"name": "Insyde UEFI Firmware RV24.06",
"product_id": "T038077-fixed",
"product_identification_helper": {
"cpe": "cpe:/h:insyde:uefi:rv24.06"
}
}
}
],
"category": "product_name",
"name": "UEFI Firmware"
}
],
"category": "vendor",
"name": "Insyde"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c9.18.28",
"product": {
"name": "Internet Systems Consortium BIND \u003c9.18.28",
"product_id": "T036434"
}
},
{
"category": "product_version",
"name": "9.18.28",
"product": {
"name": "Internet Systems Consortium BIND 9.18.28",
"product_id": "T036434-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:isc:bind:9.18.28"
}
}
},
{
"category": "product_version_range",
"name": "\u003c9.20.0",
"product": {
"name": "Internet Systems Consortium BIND \u003c9.20.0",
"product_id": "T036435"
}
},
{
"category": "product_version",
"name": "9.20.0",
"product": {
"name": "Internet Systems Consortium BIND 9.20.0",
"product_id": "T036435-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:isc:bind:9.20.0"
}
}
}
],
"category": "product_name",
"name": "BIND"
}
],
"category": "vendor",
"name": "Internet Systems Consortium"
},
{
"branches": [
{
"category": "product_name",
"name": "NetApp ActiveIQ Unified Manager",
"product": {
"name": "NetApp ActiveIQ Unified Manager",
"product_id": "T026333",
"product_identification_helper": {
"cpe": "cpe:/a:netapp:active_iq_unified_manager:vmware_vsphere"
}
}
}
],
"category": "vendor",
"name": "NetApp"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "RESF Rocky Linux",
"product": {
"name": "RESF Rocky Linux",
"product_id": "T032255",
"product_identification_helper": {
"cpe": "cpe:/o:resf:rocky_linux:-"
}
}
}
],
"category": "vendor",
"name": "RESF"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "v9 for Solaris",
"product": {
"name": "Xerox FreeFlow Print Server v9 for Solaris",
"product_id": "T028053",
"product_identification_helper": {
"cpe": "cpe:/a:xerox:freeflow_print_server:v9_for_solaris"
}
}
}
],
"category": "product_name",
"name": "FreeFlow Print Server"
}
],
"category": "vendor",
"name": "Xerox"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-0760",
"notes": [
{
"category": "description",
"text": "In Internet Systems Consortium BIND existieren mehrere Schwachstellen. Diese Fehler sind auf eine unsachgem\u00e4\u00dfe Behandlung von DNS-Nachrichten, DNSSEC-Validierung und eine gro\u00dfe Anzahl von Ressourcendatens\u00e4tzen zur\u00fcckzuf\u00fchren, was zu Instabilit\u00e4t, Leistungseinbu\u00dfen, Abst\u00fcrzen und Assertion-Fehlern f\u00fchrt. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen."
}
],
"product_status": {
"known_affected": [
"67646",
"T034902",
"T020639",
"T037731",
"T020638",
"T004914",
"T036441",
"T026927",
"1139691",
"T020642",
"T026928",
"T026925",
"T041141",
"T026926",
"T026924",
"T001663",
"398363",
"T022362",
"T032852",
"T034899",
"T032853",
"T028053",
"434967",
"T032854",
"1039165",
"1522854",
"T037028",
"T036434",
"T036435",
"T039245",
"T032255",
"74185",
"T026929",
"T038076",
"T038077",
"2951",
"T002207",
"T000126",
"T024812",
"T026932",
"T026930",
"T026931",
"T026333",
"T028256"
]
},
"release_date": "2024-07-23T22:00:00.000+00:00",
"title": "CVE-2024-0760"
},
{
"cve": "CVE-2024-1737",
"notes": [
{
"category": "description",
"text": "In Internet Systems Consortium BIND existieren mehrere Schwachstellen. Diese Fehler sind auf eine unsachgem\u00e4\u00dfe Behandlung von DNS-Nachrichten, DNSSEC-Validierung und eine gro\u00dfe Anzahl von Ressourcendatens\u00e4tzen zur\u00fcckzuf\u00fchren, was zu Instabilit\u00e4t, Leistungseinbu\u00dfen, Abst\u00fcrzen und Assertion-Fehlern f\u00fchrt. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen."
}
],
"product_status": {
"known_affected": [
"67646",
"T034902",
"T020639",
"T037731",
"T020638",
"T004914",
"T036441",
"T026927",
"1139691",
"T020642",
"T026928",
"T026925",
"T041141",
"T026926",
"T026924",
"T001663",
"398363",
"T022362",
"T032852",
"T034899",
"T032853",
"T028053",
"434967",
"T032854",
"1039165",
"1522854",
"T037028",
"T036434",
"T036435",
"T039245",
"T032255",
"74185",
"T026929",
"T038076",
"T038077",
"2951",
"T002207",
"T000126",
"T024812",
"T026932",
"T026930",
"T026931",
"T026333",
"T028256"
]
},
"release_date": "2024-07-23T22:00:00.000+00:00",
"title": "CVE-2024-1737"
},
{
"cve": "CVE-2024-1975",
"notes": [
{
"category": "description",
"text": "In Internet Systems Consortium BIND existieren mehrere Schwachstellen. Diese Fehler sind auf eine unsachgem\u00e4\u00dfe Behandlung von DNS-Nachrichten, DNSSEC-Validierung und eine gro\u00dfe Anzahl von Ressourcendatens\u00e4tzen zur\u00fcckzuf\u00fchren, was zu Instabilit\u00e4t, Leistungseinbu\u00dfen, Abst\u00fcrzen und Assertion-Fehlern f\u00fchrt. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen."
}
],
"product_status": {
"known_affected": [
"67646",
"T034902",
"T020639",
"T037731",
"T020638",
"T004914",
"T036441",
"T026927",
"1139691",
"T020642",
"T026928",
"T026925",
"T041141",
"T026926",
"T026924",
"T001663",
"398363",
"T022362",
"T032852",
"T034899",
"T032853",
"T028053",
"434967",
"T032854",
"1039165",
"1522854",
"T037028",
"T036434",
"T036435",
"T039245",
"T032255",
"74185",
"T026929",
"T038076",
"T038077",
"2951",
"T002207",
"T000126",
"T024812",
"T026932",
"T026930",
"T026931",
"T026333",
"T028256"
]
},
"release_date": "2024-07-23T22:00:00.000+00:00",
"title": "CVE-2024-1975"
},
{
"cve": "CVE-2024-4076",
"notes": [
{
"category": "description",
"text": "In Internet Systems Consortium BIND existieren mehrere Schwachstellen. Diese Fehler sind auf eine unsachgem\u00e4\u00dfe Behandlung von DNS-Nachrichten, DNSSEC-Validierung und eine gro\u00dfe Anzahl von Ressourcendatens\u00e4tzen zur\u00fcckzuf\u00fchren, was zu Instabilit\u00e4t, Leistungseinbu\u00dfen, Abst\u00fcrzen und Assertion-Fehlern f\u00fchrt. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen."
}
],
"product_status": {
"known_affected": [
"67646",
"T034902",
"T020639",
"T037731",
"T020638",
"T004914",
"T036441",
"T026927",
"1139691",
"T020642",
"T026928",
"T026925",
"T041141",
"T026926",
"T026924",
"T001663",
"398363",
"T022362",
"T032852",
"T034899",
"T032853",
"T028053",
"434967",
"T032854",
"1039165",
"1522854",
"T037028",
"T036434",
"T036435",
"T039245",
"T032255",
"74185",
"T026929",
"T038076",
"T038077",
"2951",
"T002207",
"T000126",
"T024812",
"T026932",
"T026930",
"T026931",
"T026333",
"T028256"
]
},
"release_date": "2024-07-23T22:00:00.000+00:00",
"title": "CVE-2024-4076"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.