CVE-2023-3341
Published: 20 September 2023
The code that processes control channel messages sent to `named` calls certain functions recursively during packet parsing. Recursion depth is only limited by the maximum accepted packet size; depending on the environment, this may cause the packet-parsing code to run out of available stack memory, causing `named` to terminate unexpectedly. Since each incoming control channel message is fully parsed before its contents are authenticated, exploiting this flaw does not require the attacker to hold a valid RNDC key; only network access to the control channel's configured TCP port is necessary. This issue affects BIND 9 versions 9.2.0 through 9.16.43, 9.18.0 through 9.18.18, 9.19.0 through 9.19.16, 9.9.3-S1 through 9.16.43-S1, and 9.18.0-S1 through 9.18.18-S1.
Notes
Author | Note |
---|---|
alexmurray | As of isc-dhcp-4.4.3-1, isc-dhcp vendors bind9 libs |
mdeslaur | I don't believe this issue applies to the bind9 libs in isc-dhcp, marking as not-affected |
Priority
Status
Package | Release | Status |
---|---|---|
bind9 Launchpad, Ubuntu, Debian |
upstream |
Released
(9.16.44,9.18.19,9.19.17)
|
focal |
Released
(1:9.16.1-0ubuntu2.16)
|
|
jammy |
Released
(1:9.18.12-0ubuntu0.22.04.3)
|
|
lunar |
Released
(1:9.18.12-1ubuntu1.2)
|
|
bionic |
Released
(1:9.11.3+dfsg-1ubuntu1.19+esm2)
Available with Ubuntu Pro or Ubuntu Pro (Infra-only) |
|
trusty |
Released
(1:9.9.5.dfsg-3ubuntu0.19+esm11)
Available with Ubuntu Pro or Ubuntu Pro (Infra-only) |
|
xenial |
Released
(1:9.10.3.dfsg.P4-8ubuntu1.19+esm7)
Available with Ubuntu Pro or Ubuntu Pro (Infra-only) |
|
mantic |
Released
(1:9.18.18-0ubuntu2)
|
|
isc-dhcp Launchpad, Ubuntu, Debian |
trusty |
Not vulnerable
(code not present)
|
xenial |
Not vulnerable
(code not present)
|
|
bionic |
Needs triage
|
|
focal |
Not vulnerable
(code not present)
|
|
jammy |
Not vulnerable
(code not present)
|
|
upstream |
Needs triage
|
|
lunar |
Not vulnerable
|
|
mantic |
Not vulnerable
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.5 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | None |
Availability impact | High |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |