named may terminate unexpectedly under high DNS-over-TLS query load
CVE-2023-4236

7.5HIGH

Key Information:

Vendor
Isc
Status
Vendor
CVE Published:
20 September 2023

Badges

👾 Exploit Exists

Summary

A networking flaw in BIND 9's handling of DNS-over-TLS queries may result in unexpected terminations of the 'named' service. This occurs due to an assertion failure triggered when internal data structures are reused improperly under significant load from DNS-over-TLS queries. Systems running BIND versions between 9.18.0 and 9.18.18, and 9.18.11-S1 to 9.18.18-S1 are affected, potentially leading to service disruptions.

Affected Version(s)

BIND 9 9.18.0 <= 9.18.18

BIND 9 9.18.11-S1 <= 9.18.18-S1

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

ISC would like to thank Robert Story from the USC/ISI DNS root server operations team for bringing this vulnerability to our attention.
.