QID 15143

Date Published: 2023-07-10

QID 15143: ISC BIND Denial Of Service (DOS) Vulnerability Caused by Malformed NSEC

ISC BIND (Berkley Internet Domain Name) is an implementation of DNS protocols.

A named instance configured to run as a DNSSEC-validating recursive resolver with the Aggressive Use of DNSSEC-Validated Cache (RFC 8198) option (synth-from-dnssec) enabled can be remotely terminated using a zone with a malformed NSEC record. Affected software:
BIND 9 9.16.8-S1 -> 9.16.41-S1
BIND 9 9.18.11-S1 -> 9.18.15-S1

Patched Versions:
9.16.42-S1
9.18.16-S1

QID Detection Logic:
This unauthenticated check detects vulnerable systems by fetching the version information from the BIND service.

Successful exploitation may allow an attacker cause named to terminate unexpectedly.

  • CVSS V3 rated as High - 7.5 severity.
  • CVSS V2 rated as High - 7.8 severity.
  • Solution
    Customers are advised to upgrade to the patched version 9.16.42-S1,9.18.16-S1 or latest release of ISC BIND.Workaround:
    Setting synth-from-dnssec to no prevents the problem.
    Vendor References

    CVEs related to QID 15143

    Software Advisories
    Advisory ID Software Component Link
    cve-2023-2829 URL Logo kb.isc.org/v1/docs/cve-2023-2829