Resource Exhaustion The advisory has been revoked - it doesn't affect any version of package aardvark-dns  (opens in a new tab)


Threat Intelligence

EPSS
0.05% (24th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Resource Exhaustion vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-CENTOS8-AARDVARKDNS-7895791
  • published4 Sept 2024
  • disclosed4 Sept 2024

Introduced: 4 Sep 2024

CVE-2024-8418  (opens in a new tab)
CWE-400  (opens in a new tab)

Amendment

The Centos security team deemed this advisory irrelevant for Centos:8.

NVD Description

Note: Versions mentioned in the description apply only to the upstream aardvark-dns package and not the aardvark-dns package as distributed by Centos.

A flaw was found in Aardvark-dns, which is vulnerable to a Denial of Service attack due to the serial processing of TCP DNS queries. An attacker can exploit this flaw by keeping a TCP connection open indefinitely, causing the server to become unresponsive and resulting in other DNS queries timing out. This issue prevents legitimate users from accessing DNS services, thereby disrupting normal operations and causing service downtime.