Lucene search

K
vulnrichmentIscVULNRICHMENT:CVE-2023-4408
HistoryFeb 13, 2024 - 2:04 p.m.

CVE-2023-4408 Parsing large DNS messages may cause excessive CPU load

2024-02-1314:04:17
isc
github.com
3
cve-2023-4408
dns message
parsing
cpu load
bind 9
authoritative servers

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

7.2

Confidence

Low

SSVC

Exploitation

none

Automatable

no

Technical Impact

partial

The DNS message parsing code in named includes a section whose computational complexity is overly high. It does not cause problems for typical DNS traffic, but crafted queries and responses may cause excessive CPU load on the affected named instance by exploiting this flaw. This issue affects both authoritative servers and recursive resolvers.
This issue affects BIND 9 versions 9.0.0 through 9.16.45, 9.18.0 through 9.18.21, 9.19.0 through 9.19.19, 9.9.3-S1 through 9.11.37-S1, 9.16.8-S1 through 9.16.45-S1, and 9.18.11-S1 through 9.18.21-S1.

CNA Affected

[
  {
    "vendor": "ISC",
    "product": "BIND 9",
    "versions": [
      {
        "status": "affected",
        "version": "9.0.0",
        "versionType": "custom",
        "lessThanOrEqual": "9.16.45"
      },
      {
        "status": "affected",
        "version": "9.18.0",
        "versionType": "custom",
        "lessThanOrEqual": "9.18.21"
      },
      {
        "status": "affected",
        "version": "9.19.0",
        "versionType": "custom",
        "lessThanOrEqual": "9.19.19"
      },
      {
        "status": "affected",
        "version": "9.9.3-S1",
        "versionType": "custom",
        "lessThanOrEqual": "9.11.37-S1"
      },
      {
        "status": "affected",
        "version": "9.16.8-S1",
        "versionType": "custom",
        "lessThanOrEqual": "9.16.45-S1"
      },
      {
        "status": "affected",
        "version": "9.18.11-S1",
        "versionType": "custom",
        "lessThanOrEqual": "9.18.21-S1"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

7.2

Confidence

Low

SSVC

Exploitation

none

Automatable

no

Technical Impact

partial