{"id":"CVE-2024-12705","details":"Clients using DNS-over-HTTPS (DoH) can exhaust a DNS resolver's CPU and/or memory by flooding it with crafted valid or invalid HTTP/2 traffic.\nThis issue affects BIND 9 versions 9.18.0 through 9.18.32, 9.20.0 through 9.20.4, 9.21.0 through 9.21.3, and 9.18.11-S1 through 9.18.32-S1.","modified":"2026-02-04T11:28:53.549673Z","published":"2025-01-29T22:15:28Z","related":["ALSA-2025:1670","CGA-fq9h-qvvp-p8m7","MGASA-2025-0036","SUSE-SU-2025:01787-1","SUSE-SU-2025:0355-1","openSUSE-SU-2025:14719-1"],"references":[{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20250207-0003/"},{"type":"WEB","url":"https://kb.isc.org/docs/cve-2024-12705"}],"schema_version":"1.7.3"}