QID 15143
Date Published: 2023-07-10
QID 15143: ISC BIND Denial Of Service (DOS) Vulnerability Caused by Malformed NSEC
ISC BIND (Berkley Internet Domain Name) is an implementation of DNS protocols.
A named instance configured to run as a DNSSEC-validating recursive resolver with the Aggressive Use of DNSSEC-Validated Cache (RFC 8198) option (synth-from-dnssec) enabled can be remotely terminated using a zone with a malformed NSEC record.
Affected software:
BIND 9 9.16.8-S1 -> 9.16.41-S1
BIND 9 9.18.11-S1 -> 9.18.15-S1
Patched Versions:
9.16.42-S1
9.18.16-S1
QID Detection Logic:
This unauthenticated check detects vulnerable systems by fetching the version information from the BIND service.
Successful exploitation may allow an attacker cause named to terminate unexpectedly.
Solution
Customers are advised to upgrade to the patched version 9.16.42-S1,9.18.16-S1 or latest release of ISC BIND.Workaround:
Setting synth-from-dnssec to no prevents the problem.
Setting synth-from-dnssec to no prevents the problem.
Vendor References
- BIND CVE-2023-2829 -
kb.isc.org/v1/docs/cve-2023-2829
CVEs related to QID 15143
Software Advisories
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| cve-2023-2829 |
|