7.5

CVE-2023-3341

The code that processes control channel messages sent to `named` calls certain functions recursively during packet parsing. Recursion depth is only limited by the maximum accepted packet size; depending on the environment, this may cause the packet-parsing code to run out of available stack memory, causing `named` to terminate unexpectedly. Since each incoming control channel message is fully parsed before its contents are authenticated, exploiting this flaw does not require the attacker to hold a valid RNDC key; only network access to the control channel's configured TCP port is necessary.
This issue affects BIND 9 versions 9.2.0 through 9.16.43, 9.18.0 through 9.18.18, 9.19.0 through 9.19.16, 9.9.3-S1 through 9.16.43-S1, and 9.18.0-S1 through 9.18.18-S1.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
IscBind SwEdition- Version >= 9.2.0 < 9.16.44
IscBind SwEdition- Version >= 9.18.0 < 9.18.19
IscBind SwEdition- Version >= 9.19.0 < 9.19.17
IscBind Version9.9.3 Updates1 SwEditionsupported_preview
IscBind Version9.9.12 Updates1 SwEditionsupported_preview
IscBind Version9.9.13 Updates1 SwEditionsupported_preview
IscBind Version9.10.5 Updates1 SwEditionsupported_preview
IscBind Version9.10.7 Updates1 SwEditionsupported_preview
IscBind Version9.11.3 Updates1 SwEditionsupported_preview
IscBind Version9.11.3 Updates4 SwEditionsupported_preview
IscBind Version9.11.4 Updates1 SwEditionsupported_preview
IscBind Version9.11.5 Updates3 SwEditionsupported_preview
IscBind Version9.11.5 Updates5 SwEditionsupported_preview
IscBind Version9.11.5 Updates6 SwEditionsupported_preview
IscBind Version9.11.6 Updates1 SwEditionsupported_preview
IscBind Version9.11.7 Updates1 SwEditionsupported_preview
IscBind Version9.11.8 Updates1 SwEditionsupported_preview
IscBind Version9.11.12 Updates1 SwEditionsupported_preview
IscBind Version9.11.21 Updates1 SwEditionsupported_preview
IscBind Version9.11.27 Updates1 SwEditionsupported_preview
IscBind Version9.11.29 Updates1 SwEditionsupported_preview
IscBind Version9.11.35 Updates1 SwEditionsupported_preview
IscBind Version9.11.37 Updates1 SwEditionsupported_preview
IscBind Version9.16.8 Updates1 SwEditionsupported_preview
IscBind Version9.16.11 Updates1 SwEditionsupported_preview
IscBind Version9.16.12 Updates1 SwEditionsupported_preview
IscBind Version9.16.13 Updates1 SwEditionsupported_preview
IscBind Version9.16.14 Updates1 SwEditionsupported_preview
IscBind Version9.16.21 Updates1 SwEditionsupported_preview
IscBind Version9.16.32 Updates1 SwEditionsupported_preview
IscBind Version9.16.36 Updates1 SwEditionsupported_preview
IscBind Version9.16.43 Updates1 SwEditionsupported_preview
IscBind Version9.18.0 Updates1 SwEditionsupported_preview
IscBind Version9.18.18 Updates1 SwEditionsupported_preview
FedoraprojectFedora Version37
FedoraprojectFedora Version38
DebianDebian Linux Version10.0
DebianDebian Linux Version11.0
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.29% 0.52
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
security-officer@isc.org 7.5 3.9 3.6
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CWE-787 Out-of-bounds Write

The product writes data past the end, or before the beginning, of the intended buffer.