CVE-2024-12705

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-12705
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-12705.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-12705
Downstream
Related
Published
2025-01-29T22:15:28Z
Modified
2025-08-09T20:01:28Z
Summary
[none]
Details

Clients using DNS-over-HTTPS (DoH) can exhaust a DNS resolver's CPU and/or memory by flooding it with crafted valid or invalid HTTP/2 traffic. This issue affects BIND 9 versions 9.18.0 through 9.18.32, 9.20.0 through 9.20.4, 9.21.0 through 9.21.3, and 9.18.11-S1 through 9.18.32-S1.

References

Affected packages