Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2023-5474

Опубликовано: 06 окт. 2023
Источник: oracle-oval
Платформа: Oracle Linux 8

Описание

ELSA-2023-5474: bind security update (IMPORTANT)

[32:9.11.36-8.2]

  • stack exhaustion in control channel code may lead to DoS (CVE-2023-3341)

Обновленные пакеты

Oracle Linux 8

Oracle Linux aarch64

bind

9.11.36-8.el8_8.2

bind-chroot

9.11.36-8.el8_8.2

bind-devel

9.11.36-8.el8_8.2

bind-export-devel

9.11.36-8.el8_8.2

bind-export-libs

9.11.36-8.el8_8.2

bind-libs

9.11.36-8.el8_8.2

bind-libs-lite

9.11.36-8.el8_8.2

bind-license

9.11.36-8.el8_8.2

bind-lite-devel

9.11.36-8.el8_8.2

bind-pkcs11

9.11.36-8.el8_8.2

bind-pkcs11-devel

9.11.36-8.el8_8.2

bind-pkcs11-libs

9.11.36-8.el8_8.2

bind-pkcs11-utils

9.11.36-8.el8_8.2

bind-sdb

9.11.36-8.el8_8.2

bind-sdb-chroot

9.11.36-8.el8_8.2

bind-utils

9.11.36-8.el8_8.2

python3-bind

9.11.36-8.el8_8.2

Oracle Linux x86_64

bind

9.11.36-8.el8_8.2

bind-chroot

9.11.36-8.el8_8.2

bind-devel

9.11.36-8.el8_8.2

bind-export-devel

9.11.36-8.el8_8.2

bind-export-libs

9.11.36-8.el8_8.2

bind-libs

9.11.36-8.el8_8.2

bind-libs-lite

9.11.36-8.el8_8.2

bind-license

9.11.36-8.el8_8.2

bind-lite-devel

9.11.36-8.el8_8.2

bind-pkcs11

9.11.36-8.el8_8.2

bind-pkcs11-devel

9.11.36-8.el8_8.2

bind-pkcs11-libs

9.11.36-8.el8_8.2

bind-pkcs11-utils

9.11.36-8.el8_8.2

bind-sdb

9.11.36-8.el8_8.2

bind-sdb-chroot

9.11.36-8.el8_8.2

bind-utils

9.11.36-8.el8_8.2

python3-bind

9.11.36-8.el8_8.2

Связанные CVE

Связанные уязвимости

CVSS3: 7.5
ubuntu
почти 2 года назад

The code that processes control channel messages sent to `named` calls certain functions recursively during packet parsing. Recursion depth is only limited by the maximum accepted packet size; depending on the environment, this may cause the packet-parsing code to run out of available stack memory, causing `named` to terminate unexpectedly. Since each incoming control channel message is fully parsed before its contents are authenticated, exploiting this flaw does not require the attacker to hold a valid RNDC key; only network access to the control channel's configured TCP port is necessary. This issue affects BIND 9 versions 9.2.0 through 9.16.43, 9.18.0 through 9.18.18, 9.19.0 through 9.19.16, 9.9.3-S1 through 9.16.43-S1, and 9.18.0-S1 through 9.18.18-S1.

CVSS3: 7.5
redhat
почти 2 года назад

The code that processes control channel messages sent to `named` calls certain functions recursively during packet parsing. Recursion depth is only limited by the maximum accepted packet size; depending on the environment, this may cause the packet-parsing code to run out of available stack memory, causing `named` to terminate unexpectedly. Since each incoming control channel message is fully parsed before its contents are authenticated, exploiting this flaw does not require the attacker to hold a valid RNDC key; only network access to the control channel's configured TCP port is necessary. This issue affects BIND 9 versions 9.2.0 through 9.16.43, 9.18.0 through 9.18.18, 9.19.0 through 9.19.16, 9.9.3-S1 through 9.16.43-S1, and 9.18.0-S1 through 9.18.18-S1.

CVSS3: 7.5
nvd
почти 2 года назад

The code that processes control channel messages sent to `named` calls certain functions recursively during packet parsing. Recursion depth is only limited by the maximum accepted packet size; depending on the environment, this may cause the packet-parsing code to run out of available stack memory, causing `named` to terminate unexpectedly. Since each incoming control channel message is fully parsed before its contents are authenticated, exploiting this flaw does not require the attacker to hold a valid RNDC key; only network access to the control channel's configured TCP port is necessary. This issue affects BIND 9 versions 9.2.0 through 9.16.43, 9.18.0 through 9.18.18, 9.19.0 through 9.19.16, 9.9.3-S1 through 9.16.43-S1, and 9.18.0-S1 through 9.18.18-S1.

CVSS3: 7.5
msrc
12 месяцев назад

Описание отсутствует

CVSS3: 7.5
debian
почти 2 года назад

The code that processes control channel messages sent to `named` calls ...