Lucene search

K
nvd[email protected]NVD:CVE-2023-3341
HistorySep 20, 2023 - 1:15 p.m.

CVE-2023-3341

2023-09-2013:15:11
CWE-787
web.nvd.nist.gov
stack-based buffer overflow
named
bind 9
control channel
packet parsing
recursive function

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.7 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

51.9%

The code that processes control channel messages sent to named calls certain functions recursively during packet parsing. Recursion depth is only limited by the maximum accepted packet size; depending on the environment, this may cause the packet-parsing code to run out of available stack memory, causing named to terminate unexpectedly. Since each incoming control channel message is fully parsed before its contents are authenticated, exploiting this flaw does not require the attacker to hold a valid RNDC key; only network access to the control channel’s configured TCP port is necessary.
This issue affects BIND 9 versions 9.2.0 through 9.16.43, 9.18.0 through 9.18.18, 9.19.0 through 9.19.16, 9.9.3-S1 through 9.16.43-S1, and 9.18.0-S1 through 9.18.18-S1.

Affected configurations

NVD
Node
iscbindRange9.2.09.16.44-
OR
iscbindRange9.18.09.18.19-
OR
iscbindRange9.19.09.19.17-
OR
iscbindMatch9.9.3s1supported_preview
OR
iscbindMatch9.9.12s1supported_preview
OR
iscbindMatch9.9.13s1supported_preview
OR
iscbindMatch9.10.5s1supported_preview
OR
iscbindMatch9.10.7s1supported_preview
OR
iscbindMatch9.11.3s1supported_preview
OR
iscbindMatch9.11.3s4supported_preview
OR
iscbindMatch9.11.4s1supported_preview
OR
iscbindMatch9.11.5s3supported_preview
OR
iscbindMatch9.11.5s5supported_preview
OR
iscbindMatch9.11.5s6supported_preview
OR
iscbindMatch9.11.6s1supported_preview
OR
iscbindMatch9.11.7s1supported_preview
OR
iscbindMatch9.11.8s1supported_preview
OR
iscbindMatch9.11.12s1supported_preview
OR
iscbindMatch9.11.21s1supported_preview
OR
iscbindMatch9.11.27s1supported_preview
OR
iscbindMatch9.11.29s1supported_preview
OR
iscbindMatch9.11.35s1supported_preview
OR
iscbindMatch9.11.37s1supported_preview
OR
iscbindMatch9.16.8s1supported_preview
OR
iscbindMatch9.16.11s1supported_preview
OR
iscbindMatch9.16.12s1supported_preview
OR
iscbindMatch9.16.13s1supported_preview
OR
iscbindMatch9.16.14s1supported_preview
OR
iscbindMatch9.16.21s1supported_preview
OR
iscbindMatch9.16.32s1supported_preview
OR
iscbindMatch9.16.36s1supported_preview
OR
iscbindMatch9.16.43s1supported_preview
OR
iscbindMatch9.18.0s1supported_preview
OR
iscbindMatch9.18.18s1supported_preview
Node
fedoraprojectfedoraMatch37
OR
fedoraprojectfedoraMatch38
Node
debiandebian_linuxMatch10.0
OR
debiandebian_linuxMatch11.0

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.7 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

51.9%