CVE-2024-24195

7.5 HIGH

📋 TL;DR

CVE-2024-24195 is a memory misalignment vulnerability in robdns that could allow attackers to cause denial of service or potentially execute arbitrary code. This affects systems running robdns DNS server software. The vulnerability is triggered during zone file insertion operations.

💻 Affected Systems

Products:
  • robdns
Versions: All versions up to and including commit d76d2e6
Operating Systems: Linux, Unix-like systems
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability is triggered when processing zone files, so systems using zone file configurations are affected

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise and attacker persistence

🟠

Likely Case

Denial of service causing DNS service disruption and potential system crashes

🟢

If Mitigated

Limited service disruption with proper segmentation and monitoring

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires sending specially crafted DNS zone data to vulnerable server

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after commit d76d2e6

Vendor Advisory: https://github.com/robertdavidgraham/robdns/issues/9

Restart Required: Yes

Instructions:

1. Update robdns to latest version from GitHub repository
2. Recompile from source if using self-compiled version
3. Restart robdns service

🔧 Temporary Workarounds

Disable zone file updates

linux

Prevent zone file insertion operations that trigger the vulnerability

# Configure robdns to use static zone files only
# Disable dynamic zone updates in configuration

Network segmentation

linux

Restrict access to robdns service to trusted networks only

iptables -A INPUT -p tcp --dport 53 -s trusted_network -j ACCEPT
iptables -A INPUT -p udp --dport 53 -s trusted_network -j ACCEPT
iptables -A INPUT -p tcp --dport 53 -j DROP
iptables -A INPUT -p udp --dport 53 -j DROP

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can send DNS queries
  • Monitor robdns logs for abnormal zone file insertion attempts and crashes

🔍 How to Verify

Check if Vulnerable:

Check robdns version or commit hash. If using commit d76d2e6 or earlier, system is vulnerable

Check Version:

robdns --version or check commit hash in source directory

Verify Fix Applied:

Verify robdns is running version after commit d76d2e6 and test zone file insertion functionality

📡 Detection & Monitoring

Log Indicators:

  • robdns crash logs
  • segmentation fault errors in system logs
  • abnormal zone file processing errors

Network Indicators:

  • Unusual DNS zone transfer requests
  • Multiple failed zone update attempts from single source

SIEM Query:

source="robdns" AND ("segmentation fault" OR "SIGSEGV" OR "zonefile-insertion")

🔗 References

📤 Share & Export