We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-8418

Containers/aardvark-dns: tcp query handling flaw in aardvark-dns leading to denial of service



Assignerredhat
Reserved2024-09-04
Published2024-09-04
Updated2024-09-05

Description

A flaw was found in Aardvark-dns versions 1.12.0 and 1.12.1. They contain a denial of service vulnerability due to serial processing of TCP DNS queries. This flaw allows a malicious client to keep a TCP connection open indefinitely, causing other DNS queries to time out and resulting in a denial of service for all other containers using aardvark-dns.



HIGH: 7.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Problem types

Uncontrolled Resource Consumption

Product status

Default status
0x4002826f20

Default status
0x4002826f80

Default status
0x4002826fe0

Default status
0x4002827040

Default status
0x40028270a0

Timeline

2024-09-03:Reported to Red Hat.
2024-09-04:Made public.

References

https://access.redhat.com/security/cve/CVE-2024-8418 vdb-entry

https://bugzilla.redhat.com/show_bug.cgi?id=2309683 (RHBZ#2309683) issue-tracking

https://github.com/containers/aardvark-dns/issues/500

https://github.com/containers/aardvark-dns/pull/503

cve.org CVE-2024-8418

nvd.nist.gov CVE-2024-8418

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-8418
Subscribe to our newsletter to learn more about our work.