Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2023-3341

Опубликовано: 20 сент. 2023
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS3: 7.5

Описание

The code that processes control channel messages sent to named calls certain functions recursively during packet parsing. Recursion depth is only limited by the maximum accepted packet size; depending on the environment, this may cause the packet-parsing code to run out of available stack memory, causing named to terminate unexpectedly. Since each incoming control channel message is fully parsed before its contents are authenticated, exploiting this flaw does not require the attacker to hold a valid RNDC key; only network access to the control channel's configured TCP port is necessary. This issue affects BIND 9 versions 9.2.0 through 9.16.43, 9.18.0 through 9.18.18, 9.19.0 through 9.19.16, 9.9.3-S1 through 9.16.43-S1, and 9.18.0-S1 through 9.18.18-S1.

РелизСтатусПримечание
bionic

ignored

end of standard support
devel

released

1:9.18.18-0ubuntu2
esm-infra-legacy/trusty

not-affected

1:9.9.5.dfsg-3ubuntu0.19+esm11
esm-infra/bionic

released

1:9.11.3+dfsg-1ubuntu1.19+esm2
esm-infra/focal

not-affected

1:9.16.1-0ubuntu2.16
esm-infra/xenial

released

1:9.10.3.dfsg.P4-8ubuntu1.19+esm7
focal

released

1:9.16.1-0ubuntu2.16
jammy

released

1:9.18.12-0ubuntu0.22.04.3
lunar

released

1:9.18.12-1ubuntu1.2
mantic

released

1:9.18.18-0ubuntu2

Показывать по

РелизСтатусПримечание
bionic

not-affected

code not present
devel

not-affected

esm-apps/noble

not-affected

esm-infra-legacy/trusty

not-affected

code not present
esm-infra/bionic

needs-triage

esm-infra/focal

not-affected

code not present
esm-infra/xenial

not-affected

code not present
focal

not-affected

code not present
jammy

not-affected

code not present
lunar

not-affected

Показывать по

EPSS

Процентиль: 38%
0.0016
Низкий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
redhat
почти 2 года назад

The code that processes control channel messages sent to `named` calls certain functions recursively during packet parsing. Recursion depth is only limited by the maximum accepted packet size; depending on the environment, this may cause the packet-parsing code to run out of available stack memory, causing `named` to terminate unexpectedly. Since each incoming control channel message is fully parsed before its contents are authenticated, exploiting this flaw does not require the attacker to hold a valid RNDC key; only network access to the control channel's configured TCP port is necessary. This issue affects BIND 9 versions 9.2.0 through 9.16.43, 9.18.0 through 9.18.18, 9.19.0 through 9.19.16, 9.9.3-S1 through 9.16.43-S1, and 9.18.0-S1 through 9.18.18-S1.

CVSS3: 7.5
nvd
почти 2 года назад

The code that processes control channel messages sent to `named` calls certain functions recursively during packet parsing. Recursion depth is only limited by the maximum accepted packet size; depending on the environment, this may cause the packet-parsing code to run out of available stack memory, causing `named` to terminate unexpectedly. Since each incoming control channel message is fully parsed before its contents are authenticated, exploiting this flaw does not require the attacker to hold a valid RNDC key; only network access to the control channel's configured TCP port is necessary. This issue affects BIND 9 versions 9.2.0 through 9.16.43, 9.18.0 through 9.18.18, 9.19.0 through 9.19.16, 9.9.3-S1 through 9.16.43-S1, and 9.18.0-S1 through 9.18.18-S1.

CVSS3: 7.5
msrc
12 месяцев назад

Описание отсутствует

CVSS3: 7.5
debian
почти 2 года назад

The code that processes control channel messages sent to `named` calls ...

suse-cvrf
больше 1 года назад

Security update for bind

EPSS

Процентиль: 38%
0.0016
Низкий

7.5 High

CVSS3

Уязвимость CVE-2023-3341