On 28. 02. 25 14:23, Laszlo Szollosi wrote:
I'm hoping I can get some insight about the vulnerability mentioned above.
We had been running BIND 9.20.4 in our infrastructure, and upgraded to 9.20.6 just recently. CVE-2024-12705 does not apply to our setup, yet we have a suspicion that we were impacted by CVE-2024-11187, but cannot confirm it.

The symptoms we experienced were a sudden increase in CPU utilization that stayed high, which I mean way higher than usual, but BIND didn't stop working.
We couldn't find anything unusual in our logs.
We have 'minimal-responses' set to 'yes' in the BIND config.

My questions are:
- Would the 'minimal-responses' setting prevent CVE-2024-11187 being exploited, or is it mitigation only?
You lost me there. What's the difference between the two options - mitigation vs. "prevention"?

It also depends on your setup. We don't know enough about your setup to judge impact of 'minimal-responses' option. Maybe we could if you share your config file.

- Would there be any log messages that indicate the exploitation, any keywords I should be looking for?
Generally no for this CVE.

- Could something else have caused such symptoms, other than the vulnerability? Our DNS servers are open to the internet.
Generally yes, there is many things which can cause CPU utilization spikes. Again, hard to tell without deeper understanding of your setup.

--
Petr Špaček
Internet Systems Consortium
--
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Reply via email to