gsd-2023-3341
Vulnerability from gsd
Modified
2023-12-13 01:20
Details
The code that processes control channel messages sent to `named` calls certain functions recursively during packet parsing. Recursion depth is only limited by the maximum accepted packet size; depending on the environment, this may cause the packet-parsing code to run out of available stack memory, causing `named` to terminate unexpectedly. Since each incoming control channel message is fully parsed before its contents are authenticated, exploiting this flaw does not require the attacker to hold a valid RNDC key; only network access to the control channel's configured TCP port is necessary. This issue affects BIND 9 versions 9.2.0 through 9.16.43, 9.18.0 through 9.18.18, 9.19.0 through 9.19.16, 9.9.3-S1 through 9.16.43-S1, and 9.18.0-S1 through 9.18.18-S1.
Aliases
Aliases



{
  "GSD": {
    "alias": "CVE-2023-3341",
    "id": "GSD-2023-3341"
  },
  "gsd": {
    "metadata": {
      "exploitCode": "unknown",
      "remediation": "unknown",
      "reportConfidence": "confirmed",
      "type": "vulnerability"
    },
    "osvSchema": {
      "aliases": [
        "CVE-2023-3341"
      ],
      "details": "The code that processes control channel messages sent to `named` calls certain functions recursively during packet parsing. Recursion depth is only limited by the maximum accepted packet size; depending on the environment, this may cause the packet-parsing code to run out of available stack memory, causing `named` to terminate unexpectedly. Since each incoming control channel message is fully parsed before its contents are authenticated, exploiting this flaw does not require the attacker to hold a valid RNDC key; only network access to the control channel\u0027s configured TCP port is necessary.\nThis issue affects BIND 9 versions 9.2.0 through 9.16.43, 9.18.0 through 9.18.18, 9.19.0 through 9.19.16, 9.9.3-S1 through 9.16.43-S1, and 9.18.0-S1 through 9.18.18-S1.",
      "id": "GSD-2023-3341",
      "modified": "2023-12-13T01:20:55.083955Z",
      "schema_version": "1.4.0"
    }
  },
  "namespaces": {
    "cve.org": {
      "CVE_data_meta": {
        "ASSIGNER": "security-officer@isc.org",
        "ID": "CVE-2023-3341",
        "STATE": "PUBLIC"
      },
      "affects": {
        "vendor": {
          "vendor_data": [
            {
              "product": {
                "product_data": [
                  {
                    "product_name": "BIND 9",
                    "version": {
                      "version_data": [
                        {
                          "version_affected": "\u003c=",
                          "version_name": "9.2.0",
                          "version_value": "9.16.43"
                        },
                        {
                          "version_affected": "\u003c=",
                          "version_name": "9.18.0",
                          "version_value": "9.18.18"
                        },
                        {
                          "version_affected": "\u003c=",
                          "version_name": "9.19.0",
                          "version_value": "9.19.16"
                        },
                        {
                          "version_affected": "\u003c=",
                          "version_name": "9.9.3-S1",
                          "version_value": "9.16.43-S1"
                        },
                        {
                          "version_affected": "\u003c=",
                          "version_name": "9.18.0-S1",
                          "version_value": "9.18.18-S1"
                        }
                      ]
                    }
                  }
                ]
              },
              "vendor_name": "ISC"
            }
          ]
        }
      },
      "credits": [
        {
          "lang": "en",
          "value": "ISC would like to thank Eric Sesterhenn from X41 D-Sec GmbH for bringing this vulnerability to our attention."
        }
      ],
      "data_format": "MITRE",
      "data_type": "CVE",
      "data_version": "4.0",
      "description": {
        "description_data": [
          {
            "lang": "eng",
            "value": "The code that processes control channel messages sent to `named` calls certain functions recursively during packet parsing. Recursion depth is only limited by the maximum accepted packet size; depending on the environment, this may cause the packet-parsing code to run out of available stack memory, causing `named` to terminate unexpectedly. Since each incoming control channel message is fully parsed before its contents are authenticated, exploiting this flaw does not require the attacker to hold a valid RNDC key; only network access to the control channel\u0027s configured TCP port is necessary.\nThis issue affects BIND 9 versions 9.2.0 through 9.16.43, 9.18.0 through 9.18.18, 9.19.0 through 9.19.16, 9.9.3-S1 through 9.16.43-S1, and 9.18.0-S1 through 9.18.18-S1."
          }
        ]
      },
      "exploit": [
        {
          "lang": "en",
          "value": "We are not aware of any active exploits."
        }
      ],
      "impact": {
        "cvss": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          }
        ]
      },
      "problemtype": {
        "problemtype_data": [
          {
            "description": [
              {
                "lang": "eng",
                "value": "n/a"
              }
            ]
          }
        ]
      },
      "references": {
        "reference_data": [
          {
            "name": "https://kb.isc.org/docs/cve-2023-3341",
            "refsource": "MISC",
            "url": "https://kb.isc.org/docs/cve-2023-3341"
          },
          {
            "name": "http://www.openwall.com/lists/oss-security/2023/09/20/2",
            "refsource": "MISC",
            "url": "http://www.openwall.com/lists/oss-security/2023/09/20/2"
          },
          {
            "name": "https://www.debian.org/security/2023/dsa-5504",
            "refsource": "MISC",
            "url": "https://www.debian.org/security/2023/dsa-5504"
          },
          {
            "name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IPJLLTJCSDJJII7IIZPLTBQNWP7MZH7F/",
            "refsource": "MISC",
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IPJLLTJCSDJJII7IIZPLTBQNWP7MZH7F/"
          },
          {
            "name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U35OARLQCPMVCBBPHWBXY5M6XJLD2TZ5/",
            "refsource": "MISC",
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U35OARLQCPMVCBBPHWBXY5M6XJLD2TZ5/"
          },
          {
            "name": "https://security.netapp.com/advisory/ntap-20231013-0003/",
            "refsource": "MISC",
            "url": "https://security.netapp.com/advisory/ntap-20231013-0003/"
          },
          {
            "name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VSK5V4W4OHPM3JTJGWAQD6CZW7SFD75B/",
            "refsource": "MISC",
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VSK5V4W4OHPM3JTJGWAQD6CZW7SFD75B/"
          },
          {
            "name": "https://lists.debian.org/debian-lts-announce/2024/01/msg00021.html",
            "refsource": "MISC",
            "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00021.html"
          }
        ]
      },
      "solution": [
        {
          "lang": "en",
          "value": "Upgrade to the patched release most closely related to your current version of BIND 9: 9.16.44, 9.18.19, 9.19.17, 9.16.44-S1, or 9.18.19-S1."
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "work_around": [
        {
          "lang": "en",
          "value": "By default, `named` only allows control-channel connections over the loopback interface, making this attack impossible to carry out over the network. When enabling remote access to the control channel\u0027s configured TCP port, care should be taken to limit such access to trusted IP ranges on the network level, effectively preventing unauthorized parties from carrying out the attack described in this advisory."
        }
      ]
    },
    "nvd.nist.gov": {
      "cve": {
        "configurations": [
          {
            "nodes": [
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:a:isc:bind:*:*:*:*:-:*:*:*",
                    "matchCriteriaId": "322EA0C2-84E3-4D3E-A9DE-F02A933D6B2A",
                    "versionEndExcluding": "9.16.44",
                    "versionStartIncluding": "9.2.0",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:isc:bind:*:*:*:*:-:*:*:*",
                    "matchCriteriaId": "0A49C866-6171-4FF1-876F-9B31BF10296C",
                    "versionEndExcluding": "9.18.19",
                    "versionStartIncluding": "9.18.0",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:isc:bind:*:*:*:*:-:*:*:*",
                    "matchCriteriaId": "AF9DB43A-47CA-496E-8EF9-2F0C34A6E8E5",
                    "versionEndExcluding": "9.19.17",
                    "versionStartIncluding": "9.19.0",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:isc:bind:9.9.3:s1:*:*:supported_preview:*:*:*",
                    "matchCriteriaId": "40EE014B-0CD8-45F3-BEDB-AE6368A78B04",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:isc:bind:9.9.12:s1:*:*:supported_preview:*:*:*",
                    "matchCriteriaId": "DAF8FA8C-0526-4389-AEC6-92AD62AA3929",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:isc:bind:9.9.13:s1:*:*:supported_preview:*:*:*",
                    "matchCriteriaId": "1A9BA952-A5DF-4CBA-8928-0B373C013C32",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:isc:bind:9.10.5:s1:*:*:supported_preview:*:*:*",
                    "matchCriteriaId": "CAD41122-C5D8-4256-8CB7-FF88DCD96A13",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:isc:bind:9.10.7:s1:*:*:supported_preview:*:*:*",
                    "matchCriteriaId": "6243685F-1E5B-4FF6-AE1B-44798032FBA6",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:isc:bind:9.11.3:s1:*:*:supported_preview:*:*:*",
                    "matchCriteriaId": "C2FE13E1-0646-46FC-875B-CB4C34E20101",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:isc:bind:9.11.3:s4:*:*:supported_preview:*:*:*",
                    "matchCriteriaId": "39995ADF-74CC-4035-ADB2-010F676FCEC7",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:isc:bind:9.11.4:s1:*:*:supported_preview:*:*:*",
                    "matchCriteriaId": "37F4F055-5DE3-45FC-82DE-E17679E7B939",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:isc:bind:9.11.5:s3:*:*:supported_preview:*:*:*",
                    "matchCriteriaId": "1AA16E51-819C-4A1B-B66E-1C60C1782C0D",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:isc:bind:9.11.5:s5:*:*:supported_preview:*:*:*",
                    "matchCriteriaId": "91533F9F-C0E5-4E84-8A4C-F744F956BF97",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:isc:bind:9.11.5:s6:*:*:supported_preview:*:*:*",
                    "matchCriteriaId": "46E6A4BD-D69B-4A70-821D-5612DD1315EF",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:isc:bind:9.11.6:s1:*:*:supported_preview:*:*:*",
                    "matchCriteriaId": "8AF9D390-0D5B-4963-A2D3-BF1E7CD95E9D",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:isc:bind:9.11.7:s1:*:*:supported_preview:*:*:*",
                    "matchCriteriaId": "AB2B92F1-6BA8-41CA-9000-E0633462CC28",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:isc:bind:9.11.8:s1:*:*:supported_preview:*:*:*",
                    "matchCriteriaId": "02CA4635-7DFC-408E-A837-856E0F96CA1B",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:isc:bind:9.11.12:s1:*:*:supported_preview:*:*:*",
                    "matchCriteriaId": "3CABCB08-B838-45F7-AA87-77C6B8767DD0",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:isc:bind:9.11.21:s1:*:*:supported_preview:*:*:*",
                    "matchCriteriaId": "5CC1F26C-4757-4C87-BD8B-2FA456A88C6F",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:isc:bind:9.11.27:s1:*:*:supported_preview:*:*:*",
                    "matchCriteriaId": "582A4948-B64F-45D4-807A-846A85BB6B42",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:isc:bind:9.11.29:s1:*:*:supported_preview:*:*:*",
                    "matchCriteriaId": "F22E7F6A-0714-480D-ACDF-5027FD6697B2",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:isc:bind:9.11.35:s1:*:*:supported_preview:*:*:*",
                    "matchCriteriaId": "255AEB06-F071-4433-93E5-9436086C1A6D",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:isc:bind:9.11.37:s1:*:*:supported_preview:*:*:*",
                    "matchCriteriaId": "EF14D712-5FCF-492F-BE3E-745109E9D6E5",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:isc:bind:9.16.8:s1:*:*:supported_preview:*:*:*",
                    "matchCriteriaId": "288EAD80-574B-4839-9C2C-81D6D088A733",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:isc:bind:9.16.11:s1:*:*:supported_preview:*:*:*",
                    "matchCriteriaId": "3595F024-F910-4356-8B5B-D478960FF574",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:isc:bind:9.16.12:s1:*:*:supported_preview:*:*:*",
                    "matchCriteriaId": "1B20F152-D0C3-4F07-83B3-5EA6B116F005",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:isc:bind:9.16.13:s1:*:*:supported_preview:*:*:*",
                    "matchCriteriaId": "94661BA2-27F8-4FFE-B844-9404F735579D",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:isc:bind:9.16.14:s1:*:*:supported_preview:*:*:*",
                    "matchCriteriaId": "53593603-E2AF-4925-A6E6-109F097A0FF2",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:isc:bind:9.16.21:s1:*:*:supported_preview:*:*:*",
                    "matchCriteriaId": "751E37C2-8BFD-4306-95C1-8C01CE495FA4",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:isc:bind:9.16.32:s1:*:*:supported_preview:*:*:*",
                    "matchCriteriaId": "CC432820-F1A2-4132-A673-2620119553C5",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:isc:bind:9.16.36:s1:*:*:supported_preview:*:*:*",
                    "matchCriteriaId": "F70347F2-6750-4497-B8F4-2036F4F4443A",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:isc:bind:9.16.43:s1:*:*:supported_preview:*:*:*",
                    "matchCriteriaId": "A4B53B73-DB81-4AC1-A4E6-89BB305D6514",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:isc:bind:9.18.0:s1:*:*:supported_preview:*:*:*",
                    "matchCriteriaId": "22F7108A-73F1-4950-B2C8-AB56C1D4DAC5",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:isc:bind:9.18.18:s1:*:*:supported_preview:*:*:*",
                    "matchCriteriaId": "0233AEF2-9911-48AE-AE97-F217E3337AAF",
                    "vulnerable": true
                  }
                ],
                "negate": false,
                "operator": "OR"
              }
            ]
          },
          {
            "nodes": [
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
                    "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
                    "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9",
                    "vulnerable": true
                  }
                ],
                "negate": false,
                "operator": "OR"
              }
            ]
          },
          {
            "nodes": [
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED",
                    "vulnerable": true
                  }
                ],
                "negate": false,
                "operator": "OR"
              }
            ]
          }
        ],
        "descriptions": [
          {
            "lang": "en",
            "value": "The code that processes control channel messages sent to `named` calls certain functions recursively during packet parsing. Recursion depth is only limited by the maximum accepted packet size; depending on the environment, this may cause the packet-parsing code to run out of available stack memory, causing `named` to terminate unexpectedly. Since each incoming control channel message is fully parsed before its contents are authenticated, exploiting this flaw does not require the attacker to hold a valid RNDC key; only network access to the control channel\u0027s configured TCP port is necessary.\nThis issue affects BIND 9 versions 9.2.0 through 9.16.43, 9.18.0 through 9.18.18, 9.19.0 through 9.19.16, 9.9.3-S1 through 9.16.43-S1, and 9.18.0-S1 through 9.18.18-S1."
          },
          {
            "lang": "es",
            "value": "El c\u00f3digo que procesa los mensajes del canal de control enviados a \"named\" llama a ciertas funciones de forma recursiva durante el an\u00e1lisis de paquetes. La profundidad de la recursividad s\u00f3lo est\u00e1 limitada por el tama\u00f1o m\u00e1ximo de paquete aceptado; Dependiendo del entorno, esto puede provocar que el c\u00f3digo de an\u00e1lisis de paquetes se quede sin memoria disponible, lo que provocar\u00e1 que \"named\" finalice inesperadamente. Dado que cada mensaje entrante del canal de control se analiza completamente antes de autenticar su contenido, explotar esta falla no requiere que el atacante tenga una clave RNDC v\u00e1lida; s\u00f3lo es necesario el acceso de red al puerto TCP configurado del canal de control. Este problema afecta a las versiones de BIND 9, 9.2.0 a 9.16.43, 9.18.0 a 9.18.18, 9.19.0 a 9.19.16, 9.9.3-S1 a 9.16.43-S1 y 9.18.0-S1 a 9.18. .18-S1."
          }
        ],
        "id": "CVE-2023-3341",
        "lastModified": "2024-02-16T18:39:05.933",
        "metrics": {
          "cvssMetricV31": [
            {
              "cvssData": {
                "attackComplexity": "LOW",
                "attackVector": "NETWORK",
                "availabilityImpact": "HIGH",
                "baseScore": 7.5,
                "baseSeverity": "HIGH",
                "confidentialityImpact": "NONE",
                "integrityImpact": "NONE",
                "privilegesRequired": "NONE",
                "scope": "UNCHANGED",
                "userInteraction": "NONE",
                "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                "version": "3.1"
              },
              "exploitabilityScore": 3.9,
              "impactScore": 3.6,
              "source": "security-officer@isc.org",
              "type": "Primary"
            }
          ]
        },
        "published": "2023-09-20T13:15:11.770",
        "references": [
          {
            "source": "security-officer@isc.org",
            "tags": [
              "Mailing List",
              "Patch"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2023/09/20/2"
          },
          {
            "source": "security-officer@isc.org",
            "tags": [
              "Vendor Advisory"
            ],
            "url": "https://kb.isc.org/docs/cve-2023-3341"
          },
          {
            "source": "security-officer@isc.org",
            "tags": [
              "Third Party Advisory"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00021.html"
          },
          {
            "source": "security-officer@isc.org",
            "tags": [
              "Mailing List"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IPJLLTJCSDJJII7IIZPLTBQNWP7MZH7F/"
          },
          {
            "source": "security-officer@isc.org",
            "tags": [
              "Mailing List"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U35OARLQCPMVCBBPHWBXY5M6XJLD2TZ5/"
          },
          {
            "source": "security-officer@isc.org",
            "tags": [
              "Mailing List",
              "Third Party Advisory"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VSK5V4W4OHPM3JTJGWAQD6CZW7SFD75B/"
          },
          {
            "source": "security-officer@isc.org",
            "tags": [
              "Third Party Advisory"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20231013-0003/"
          },
          {
            "source": "security-officer@isc.org",
            "tags": [
              "Third Party Advisory"
            ],
            "url": "https://www.debian.org/security/2023/dsa-5504"
          }
        ],
        "sourceIdentifier": "security-officer@isc.org",
        "vulnStatus": "Analyzed",
        "weaknesses": [
          {
            "description": [
              {
                "lang": "en",
                "value": "CWE-787"
              }
            ],
            "source": "nvd@nist.gov",
            "type": "Primary"
          }
        ]
      }
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...

Loading...

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.