named may terminate unexpectedly under high DNS-over-TLS query load
CVE-2023-4236
7.5HIGH
Summary
A flaw in the networking code handling DNS-over-TLS queries may cause `named` to terminate unexpectedly due to an assertion failure. This happens when internal data structures are incorrectly reused under significant DNS-over-TLS query load. This issue affects BIND 9 versions 9.18.0 through 9.18.18 and 9.18.11-S1 through 9.18.18-S1.
Affected Version(s)
BIND 9 <= 9.18.18
BIND 9 <= 9.18.18-S1
CVSS V3.1
Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published.
Vulnerability Reserved.
Collectors
NVD DatabaseMitre Database
Credit
ISC would like to thank Robert Story from the USC/ISI DNS root server operations team for bringing this vulnerability to our attention.