Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

rocky логотип

RLSA-2023:5689

Опубликовано: 14 окт. 2023
Источник: rocky
Оценка: Important

Описание

Important: bind security update

The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.

Security Fix(es):

  • bind: stack exhaustion in control channel code may lead to DoS (CVE-2023-3341)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Затронутые продукты

  • Rocky Linux 9

НаименованиеАрхитектураРелизRPM
bind-chrootaarch6411.el9_2.2bind-chroot-9.16.23-11.el9_2.2.aarch64.rpm
bindaarch6411.el9_2.2bind-9.16.23-11.el9_2.2.aarch64.rpm
bind-dnssec-docnoarch11.el9_2.2bind-dnssec-doc-9.16.23-11.el9_2.2.noarch.rpm
bind-dnssec-utilsaarch6411.el9_2.2bind-dnssec-utils-9.16.23-11.el9_2.2.aarch64.rpm
bind-libsaarch6411.el9_2.2bind-libs-9.16.23-11.el9_2.2.aarch64.rpm
bind-licensenoarch11.el9_2.2bind-license-9.16.23-11.el9_2.2.noarch.rpm
bind-utilsaarch6411.el9_2.2bind-utils-9.16.23-11.el9_2.2.aarch64.rpm
python3-bindnoarch11.el9_2.2python3-bind-9.16.23-11.el9_2.2.noarch.rpm

Показывать по

Связанные CVE

Исправления

Связанные уязвимости

CVSS3: 7.5
ubuntu
почти 2 года назад

The code that processes control channel messages sent to `named` calls certain functions recursively during packet parsing. Recursion depth is only limited by the maximum accepted packet size; depending on the environment, this may cause the packet-parsing code to run out of available stack memory, causing `named` to terminate unexpectedly. Since each incoming control channel message is fully parsed before its contents are authenticated, exploiting this flaw does not require the attacker to hold a valid RNDC key; only network access to the control channel's configured TCP port is necessary. This issue affects BIND 9 versions 9.2.0 through 9.16.43, 9.18.0 through 9.18.18, 9.19.0 through 9.19.16, 9.9.3-S1 through 9.16.43-S1, and 9.18.0-S1 through 9.18.18-S1.

CVSS3: 7.5
redhat
почти 2 года назад

The code that processes control channel messages sent to `named` calls certain functions recursively during packet parsing. Recursion depth is only limited by the maximum accepted packet size; depending on the environment, this may cause the packet-parsing code to run out of available stack memory, causing `named` to terminate unexpectedly. Since each incoming control channel message is fully parsed before its contents are authenticated, exploiting this flaw does not require the attacker to hold a valid RNDC key; only network access to the control channel's configured TCP port is necessary. This issue affects BIND 9 versions 9.2.0 through 9.16.43, 9.18.0 through 9.18.18, 9.19.0 through 9.19.16, 9.9.3-S1 through 9.16.43-S1, and 9.18.0-S1 through 9.18.18-S1.

CVSS3: 7.5
nvd
почти 2 года назад

The code that processes control channel messages sent to `named` calls certain functions recursively during packet parsing. Recursion depth is only limited by the maximum accepted packet size; depending on the environment, this may cause the packet-parsing code to run out of available stack memory, causing `named` to terminate unexpectedly. Since each incoming control channel message is fully parsed before its contents are authenticated, exploiting this flaw does not require the attacker to hold a valid RNDC key; only network access to the control channel's configured TCP port is necessary. This issue affects BIND 9 versions 9.2.0 through 9.16.43, 9.18.0 through 9.18.18, 9.19.0 through 9.19.16, 9.9.3-S1 through 9.16.43-S1, and 9.18.0-S1 through 9.18.18-S1.

CVSS3: 7.5
msrc
12 месяцев назад

Описание отсутствует

CVSS3: 7.5
debian
почти 2 года назад

The code that processes control channel messages sent to `named` calls ...