Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2023-4236

Опубликовано: 20 сент. 2023
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS3: 7.5

Описание

A flaw in the networking code handling DNS-over-TLS queries may cause named to terminate unexpectedly due to an assertion failure. This happens when internal data structures are incorrectly reused under significant DNS-over-TLS query load. This issue affects BIND 9 versions 9.18.0 through 9.18.18 and 9.18.11-S1 through 9.18.18-S1.

РелизСтатусПримечание
bionic

ignored

end of standard support
devel

released

1:9.18.18-0ubuntu2
esm-infra-legacy/trusty

not-affected

code not present
esm-infra/bionic

not-affected

code not present
esm-infra/focal

not-affected

code not present
esm-infra/xenial

not-affected

code not present
focal

not-affected

code not present
jammy

released

1:9.18.12-0ubuntu0.22.04.3
lunar

released

1:9.18.12-1ubuntu1.2
mantic

released

1:9.18.18-0ubuntu2

Показывать по

РелизСтатусПримечание
bionic

not-affected

code not present
devel

not-affected

code not present
esm-apps/noble

not-affected

code not present
esm-infra-legacy/trusty

not-affected

code not present
esm-infra/bionic

needs-triage

esm-infra/focal

not-affected

code not present
esm-infra/xenial

not-affected

code not present
focal

not-affected

code not present
jammy

not-affected

code not present
lunar

not-affected

code not present

Показывать по

EPSS

Процентиль: 34%
0.0013
Низкий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
redhat
почти 2 года назад

A flaw in the networking code handling DNS-over-TLS queries may cause `named` to terminate unexpectedly due to an assertion failure. This happens when internal data structures are incorrectly reused under significant DNS-over-TLS query load. This issue affects BIND 9 versions 9.18.0 through 9.18.18 and 9.18.11-S1 through 9.18.18-S1.

CVSS3: 7.5
nvd
почти 2 года назад

A flaw in the networking code handling DNS-over-TLS queries may cause `named` to terminate unexpectedly due to an assertion failure. This happens when internal data structures are incorrectly reused under significant DNS-over-TLS query load. This issue affects BIND 9 versions 9.18.0 through 9.18.18 and 9.18.11-S1 through 9.18.18-S1.

CVSS3: 7.5
debian
почти 2 года назад

A flaw in the networking code handling DNS-over-TLS queries may cause ...

CVSS3: 7.5
github
почти 2 года назад

A flaw in the networking code handling DNS-over-TLS queries may cause `named` to terminate unexpectedly due to an assertion failure. This happens when internal data structures are incorrectly reused under significant DNS-over-TLS query load. This issue affects BIND 9 versions 9.18.0 through 9.18.18 and 9.18.11-S1 through 9.18.18-S1.

CVSS3: 7.5
fstec
почти 2 года назад

Уязвимость реализации протокола DoT (DNS over TLS) DNS-сервера BIND, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 34%
0.0013
Низкий

7.5 High

CVSS3

Уязвимость CVE-2023-4236