Lucene search

K
amazonAmazonALAS2-2023-2273
HistorySep 27, 2023 - 10:48 p.m.

Important: bind

2023-09-2722:48:00
alas.aws.amazon.com
18
bind
recursion
stackoverflow
securityadvisory
cve-2023-3341
networkaccess

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.9 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

51.9%

Issue Overview:

The code that processes control channel messages sent to named calls certain functions recursively during packet parsing. Recursion depth is only limited by the maximum accepted packet size; depending on the environment, this may cause the packet-parsing code to run out of available stack memory, causing named to terminate unexpectedly. Since each incoming control channel message is fully parsed before its contents are authenticated, exploiting this flaw does not require the attacker to hold a valid RNDC key; only network access to the control channel’s configured TCP port is necessary.
This issue affects BIND 9 versions 9.2.0 through 9.16.43, 9.18.0 through 9.18.18, 9.19.0 through 9.19.16, 9.9.3-S1 through 9.16.43-S1, and 9.18.0-S1 through 9.18.18-S1. (CVE-2023-3341)

Affected Packages:

bind

Note:

This advisory is applicable to Amazon Linux 2 (AL2) Core repository. Visit this FAQ section for the difference between AL2 Core and AL2 Extras advisories.

Issue Correction:
Run yum update bind to update your system.

New Packages:

aarch64:  
    bind-9.11.4-26.P2.amzn2.13.5.aarch64  
    bind-pkcs11-9.11.4-26.P2.amzn2.13.5.aarch64  
    bind-pkcs11-utils-9.11.4-26.P2.amzn2.13.5.aarch64  
    bind-pkcs11-libs-9.11.4-26.P2.amzn2.13.5.aarch64  
    bind-pkcs11-devel-9.11.4-26.P2.amzn2.13.5.aarch64  
    bind-sdb-9.11.4-26.P2.amzn2.13.5.aarch64  
    bind-libs-lite-9.11.4-26.P2.amzn2.13.5.aarch64  
    bind-libs-9.11.4-26.P2.amzn2.13.5.aarch64  
    bind-utils-9.11.4-26.P2.amzn2.13.5.aarch64  
    bind-devel-9.11.4-26.P2.amzn2.13.5.aarch64  
    bind-lite-devel-9.11.4-26.P2.amzn2.13.5.aarch64  
    bind-chroot-9.11.4-26.P2.amzn2.13.5.aarch64  
    bind-sdb-chroot-9.11.4-26.P2.amzn2.13.5.aarch64  
    bind-export-libs-9.11.4-26.P2.amzn2.13.5.aarch64  
    bind-export-devel-9.11.4-26.P2.amzn2.13.5.aarch64  
    bind-debuginfo-9.11.4-26.P2.amzn2.13.5.aarch64  
  
i686:  
    bind-9.11.4-26.P2.amzn2.13.5.i686  
    bind-pkcs11-9.11.4-26.P2.amzn2.13.5.i686  
    bind-pkcs11-utils-9.11.4-26.P2.amzn2.13.5.i686  
    bind-pkcs11-libs-9.11.4-26.P2.amzn2.13.5.i686  
    bind-pkcs11-devel-9.11.4-26.P2.amzn2.13.5.i686  
    bind-sdb-9.11.4-26.P2.amzn2.13.5.i686  
    bind-libs-lite-9.11.4-26.P2.amzn2.13.5.i686  
    bind-libs-9.11.4-26.P2.amzn2.13.5.i686  
    bind-utils-9.11.4-26.P2.amzn2.13.5.i686  
    bind-devel-9.11.4-26.P2.amzn2.13.5.i686  
    bind-lite-devel-9.11.4-26.P2.amzn2.13.5.i686  
    bind-chroot-9.11.4-26.P2.amzn2.13.5.i686  
    bind-sdb-chroot-9.11.4-26.P2.amzn2.13.5.i686  
    bind-export-libs-9.11.4-26.P2.amzn2.13.5.i686  
    bind-export-devel-9.11.4-26.P2.amzn2.13.5.i686  
    bind-debuginfo-9.11.4-26.P2.amzn2.13.5.i686  
  
noarch:  
    bind-license-9.11.4-26.P2.amzn2.13.5.noarch  
  
src:  
    bind-9.11.4-26.P2.amzn2.13.5.src  
  
x86_64:  
    bind-9.11.4-26.P2.amzn2.13.5.x86_64  
    bind-pkcs11-9.11.4-26.P2.amzn2.13.5.x86_64  
    bind-pkcs11-utils-9.11.4-26.P2.amzn2.13.5.x86_64  
    bind-pkcs11-libs-9.11.4-26.P2.amzn2.13.5.x86_64  
    bind-pkcs11-devel-9.11.4-26.P2.amzn2.13.5.x86_64  
    bind-sdb-9.11.4-26.P2.amzn2.13.5.x86_64  
    bind-libs-lite-9.11.4-26.P2.amzn2.13.5.x86_64  
    bind-libs-9.11.4-26.P2.amzn2.13.5.x86_64  
    bind-utils-9.11.4-26.P2.amzn2.13.5.x86_64  
    bind-devel-9.11.4-26.P2.amzn2.13.5.x86_64  
    bind-lite-devel-9.11.4-26.P2.amzn2.13.5.x86_64  
    bind-chroot-9.11.4-26.P2.amzn2.13.5.x86_64  
    bind-sdb-chroot-9.11.4-26.P2.amzn2.13.5.x86_64  
    bind-export-libs-9.11.4-26.P2.amzn2.13.5.x86_64  
    bind-export-devel-9.11.4-26.P2.amzn2.13.5.x86_64  
    bind-debuginfo-9.11.4-26.P2.amzn2.13.5.x86_64  

Additional References

Red Hat: CVE-2023-3341

Mitre: CVE-2023-3341

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.9 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

51.9%