CVE-2024-11187

7.5 HIGH

📋 TL;DR

This CVE describes a resource exhaustion vulnerability in BIND DNS servers where specially crafted zones can generate responses with excessive records in the Additional section. Attackers sending numerous such queries can cause disproportionate resource consumption on authoritative servers or independent resolvers. Affected systems include BIND 9 versions 9.11.0 through 9.11.37, 9.16.0 through 9.16.50, 9.18.0 through 9.18.32, and related security-branch versions.

💻 Affected Systems

Products:
  • BIND 9
Versions: 9.11.0 through 9.11.37, 9.16.0 through 9.16.50, 9.18.0 through 9.18.32, 9.20.0 through 9.20.4, 9.21.0 through 9.21.3, 9.11.3-S1 through 9.11.37-S1, 9.16.8-S1 through 9.16.50-S1, 9.18.11-S1 through 9.18.32-S1
Operating Systems: All operating systems running affected BIND versions
Default Config Vulnerable: ⚠️ Yes
Notes: Zones need to be deliberately crafted to exploit this vulnerability, but default configurations are vulnerable if such zones are loaded.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

DNS service degradation or denial of service affecting DNS resolution for dependent systems and applications.

🟠

Likely Case

Performance degradation of DNS servers under sustained attack, potentially causing intermittent resolution failures.

🟢

If Mitigated

Minimal impact with proper rate limiting, monitoring, and network segmentation in place.

🌐 Internet-Facing: HIGH - DNS servers are typically internet-facing and directly accessible to attackers.
🏢 Internal Only: MEDIUM - Internal DNS servers could be targeted through compromised internal systems or lateral movement.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires crafting malicious zones and sending numerous queries, but no authentication is needed to send DNS queries.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: BIND 9.11.38, 9.16.51, 9.18.33, 9.20.5, 9.21.4, and corresponding security-branch versions

Vendor Advisory: https://kb.isc.org/docs/cve-2024-11187

Restart Required: Yes

Instructions:

1. Download patched version from ISC or your distribution's repository. 2. Stop BIND service. 3. Install updated package. 4. Start BIND service. 5. Verify version and functionality.

🔧 Temporary Workarounds

Rate Limiting Configuration

all

Implement query rate limiting to reduce impact of excessive queries

Add to named.conf: options { rate-limit { responses-per-second 10; }; }

Response Policy Zones (RPZ)

all

Block queries to known malicious zones using RPZ

Add to named.conf: response-policy { zone "rpz.example.com"; };

🧯 If You Can't Patch

  • Implement strict network ACLs to limit DNS queries to trusted sources only
  • Deploy inline DDoS protection or DNS firewalls to filter malicious queries

🔍 How to Verify

Check if Vulnerable:

Check BIND version with: named -v

Check Version:

named -v

Verify Fix Applied:

Verify version is patched: named -v | grep -E '9\.(11\.(3[8-9]|[4-9][0-9])|16\.(5[1-9]|[6-9][0-9])|18\.(3[3-9]|[4-9][0-9])|20\.([5-9]|[1-9][0-9])|21\.([4-9]|[1-9][0-9]))'

📡 Detection & Monitoring

Log Indicators:

  • Unusual increase in query volume
  • High CPU/memory usage by named process
  • Query timeouts or failures in logs

Network Indicators:

  • Spike in DNS traffic to specific zones
  • Unusually large DNS responses
  • Repeated queries for the same domain with varying subdomains

SIEM Query:

source="bind" AND (message="query.*failed" OR message="client.*denied") | stats count by src_ip

🔗 References

📤 Share & Export