A stack exhaustion flaw in control channel code may cause named to terminate unexpectedly
CVE-2023-3341

7.5HIGH

Key Information:

Vendor
Isc
Status
Vendor
CVE Published:
20 September 2023

Badges

👾 Exploit Exists

Summary

A vulnerability in BIND 9 allows attackers to exploit the recursive nature of packet parsing during control channel message processing. This vulnerability can lead to unexpected termination of the named service due to insufficient stack memory. An attacker does not need to possess a valid RNDC key but only requires network access to the control channel's configured TCP port, making it critical for administrators to apply immediate patches to affected versions.

Affected Version(s)

BIND 9 9.2.0 <= 9.16.43

BIND 9 9.18.0 <= 9.18.18

BIND 9 9.19.0 <= 9.19.16

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

ISC would like to thank Eric Sesterhenn from X41 D-Sec GmbH for bringing this vulnerability to our attention.
.