named may terminate unexpectedly under high DNS-over-TLS query load
CVE-2023-4236
7.5HIGH
Summary
A networking flaw in BIND 9's handling of DNS-over-TLS queries may result in unexpected terminations of the 'named' service. This occurs due to an assertion failure triggered when internal data structures are reused improperly under significant load from DNS-over-TLS queries. Systems running BIND versions between 9.18.0 and 9.18.18, and 9.18.11-S1 to 9.18.18-S1 are affected, potentially leading to service disruptions.
Affected Version(s)
BIND 9 9.18.0 <= 9.18.18
BIND 9 9.18.11-S1 <= 9.18.18-S1
References
CVSS V3.1
Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved
Credit
ISC would like to thank Robert Story from the USC/ISI DNS root server operations team for bringing this vulnerability to our attention.