CVE-2024-0760

7.5 HIGH

📋 TL;DR

CVE-2024-0760 is a denial-of-service vulnerability in BIND DNS servers where malicious clients can send excessive TCP DNS queries, causing server instability during the attack. The server typically recovers after the attack stops. This affects BIND 9 installations in specific version ranges.

💻 Affected Systems

Products:
  • ISC BIND 9
Versions: 9.18.1 through 9.18.27, 9.19.0 through 9.19.24, and 9.18.11-S1 through 9.18.27-S1
Operating Systems: All operating systems running affected BIND versions
Default Config Vulnerable: ⚠️ Yes
Notes: All BIND installations using TCP DNS in affected versions are vulnerable. Use of ACLs does not mitigate this attack.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

DNS service becomes completely unavailable during attack, disrupting all DNS resolution for dependent services and clients.

🟠

Likely Case

Temporary DNS service degradation or instability during attack periods, causing intermittent resolution failures.

🟢

If Mitigated

Minimal impact with proper network controls and monitoring in place to detect and block attack traffic.

🌐 Internet-Facing: HIGH - DNS servers exposed to the internet are directly vulnerable to TCP-based DoS attacks from any source.
🏢 Internal Only: MEDIUM - Internal DNS servers are still vulnerable but attack surface is limited to internal networks.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Attack requires only ability to send TCP DNS packets to vulnerable server, making exploitation straightforward.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: BIND 9.18.28, 9.19.25, and corresponding security release versions

Vendor Advisory: https://kb.isc.org/docs/cve-2024-0760

Restart Required: Yes

Instructions:

1. Download patched version from ISC website. 2. Stop BIND service. 3. Install updated BIND package. 4. Start BIND service. 5. Verify service is running correctly.

🔧 Temporary Workarounds

Rate Limit TCP Connections

all

Configure BIND to limit TCP connection rates to reduce impact

Add to named.conf: options { max-tcp-clients 100; };
Add to named.conf: options { tcp-clients 50; };
Add to named.conf: options { transfers-per-ns 2; };

Network Filtering

linux

Use firewall rules to limit TCP DNS connections from untrusted sources

iptables -A INPUT -p tcp --dport 53 -m connlimit --connlimit-above 10 -j DROP
iptables -A INPUT -p tcp --dport 53 -m state --state NEW -m recent --set
iptables -A INPUT -p tcp --dport 53 -m state --state NEW -m recent --update --seconds 60 --hitcount 20 -j DROP

🧯 If You Can't Patch

  • Implement network-level rate limiting for TCP port 53 traffic
  • Deploy additional DNS servers for redundancy and load distribution

🔍 How to Verify

Check if Vulnerable:

Check BIND version with: named -v

Check Version:

named -v

Verify Fix Applied:

Verify version is 9.18.28+, 9.19.25+, or corresponding security release

📡 Detection & Monitoring

Log Indicators:

  • High TCP connection counts in BIND logs
  • Connection refused errors
  • Server restart messages

Network Indicators:

  • Unusual high volume of TCP traffic on port 53
  • Multiple TCP connections from single sources

SIEM Query:

source="bind" AND ("TCP" OR "connection") AND ("refused" OR "limit" OR "max")

🔗 References

📤 Share & Export