named may terminate unexpectedly under high DNS-over-TLS query load

CVE-2023-4236
7.5HIGH

Key Information

Vendor
ISC
Status
BIND 9
Vendor
CVE Published:
20 September 2023

Summary

A flaw in the networking code handling DNS-over-TLS queries may cause `named` to terminate unexpectedly due to an assertion failure. This happens when internal data structures are incorrectly reused under significant DNS-over-TLS query load. This issue affects BIND 9 versions 9.18.0 through 9.18.18 and 9.18.11-S1 through 9.18.18-S1.

Affected Version(s)

BIND 9 <= 9.18.18

BIND 9 <= 9.18.18-S1

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published.

  • Vulnerability Reserved.

Collectors

NVD DatabaseMitre Database

Credit

ISC would like to thank Robert Story from the USC/ISI DNS root server operations team for bringing this vulnerability to our attention.
.