Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2023-4236

Опубликовано: 20 сент. 2023
Источник: debian
EPSS Низкий

Описание

A flaw in the networking code handling DNS-over-TLS queries may cause `named` to terminate unexpectedly due to an assertion failure. This happens when internal data structures are incorrectly reused under significant DNS-over-TLS query load. This issue affects BIND 9 versions 9.18.0 through 9.18.18 and 9.18.11-S1 through 9.18.18-S1.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
bind9fixed1:9.19.17-1package
bind9fixed1:9.18.19-1~deb12u1bookwormpackage
bind9not-affectedbullseyepackage
bind9not-affectedbusterpackage

Примечания

  • https://kb.isc.org/docs/cve-2023-4236

  • https://gitlab.isc.org/isc-projects/bind9/-/commit/18efa454a98759bf4f3ca806d9a6ef881ff9648d (v9.18.19)

EPSS

Процентиль: 24%
0.00078
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
почти 2 года назад

A flaw in the networking code handling DNS-over-TLS queries may cause `named` to terminate unexpectedly due to an assertion failure. This happens when internal data structures are incorrectly reused under significant DNS-over-TLS query load. This issue affects BIND 9 versions 9.18.0 through 9.18.18 and 9.18.11-S1 through 9.18.18-S1.

CVSS3: 7.5
redhat
почти 2 года назад

A flaw in the networking code handling DNS-over-TLS queries may cause `named` to terminate unexpectedly due to an assertion failure. This happens when internal data structures are incorrectly reused under significant DNS-over-TLS query load. This issue affects BIND 9 versions 9.18.0 through 9.18.18 and 9.18.11-S1 through 9.18.18-S1.

CVSS3: 7.5
nvd
почти 2 года назад

A flaw in the networking code handling DNS-over-TLS queries may cause `named` to terminate unexpectedly due to an assertion failure. This happens when internal data structures are incorrectly reused under significant DNS-over-TLS query load. This issue affects BIND 9 versions 9.18.0 through 9.18.18 and 9.18.11-S1 through 9.18.18-S1.

CVSS3: 7.5
github
почти 2 года назад

A flaw in the networking code handling DNS-over-TLS queries may cause `named` to terminate unexpectedly due to an assertion failure. This happens when internal data structures are incorrectly reused under significant DNS-over-TLS query load. This issue affects BIND 9 versions 9.18.0 through 9.18.18 and 9.18.11-S1 through 9.18.18-S1.

CVSS3: 7.5
fstec
почти 2 года назад

Уязвимость реализации протокола DoT (DNS over TLS) DNS-сервера BIND, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 24%
0.00078
Низкий