7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.9 High
AI Score
Confidence
High
0.002 Low
EPSS
Percentile
51.9%
Issue Overview:
The code that processes control channel messages sent to named
calls certain functions recursively during packet parsing. Recursion depth is only limited by the maximum accepted packet size; depending on the environment, this may cause the packet-parsing code to run out of available stack memory, causing named
to terminate unexpectedly. Since each incoming control channel message is fully parsed before its contents are authenticated, exploiting this flaw does not require the attacker to hold a valid RNDC key; only network access to the control channel’s configured TCP port is necessary.
This issue affects BIND 9 versions 9.2.0 through 9.16.43, 9.18.0 through 9.18.18, 9.19.0 through 9.19.16, 9.9.3-S1 through 9.16.43-S1, and 9.18.0-S1 through 9.18.18-S1. (CVE-2023-3341)
Affected Packages:
bind
Note:
This advisory is applicable to Amazon Linux 2 (AL2) Core repository. Visit this FAQ section for the difference between AL2 Core and AL2 Extras advisories.
Issue Correction:
Run yum update bind to update your system.
New Packages:
aarch64:
bind-9.11.4-26.P2.amzn2.13.5.aarch64
bind-pkcs11-9.11.4-26.P2.amzn2.13.5.aarch64
bind-pkcs11-utils-9.11.4-26.P2.amzn2.13.5.aarch64
bind-pkcs11-libs-9.11.4-26.P2.amzn2.13.5.aarch64
bind-pkcs11-devel-9.11.4-26.P2.amzn2.13.5.aarch64
bind-sdb-9.11.4-26.P2.amzn2.13.5.aarch64
bind-libs-lite-9.11.4-26.P2.amzn2.13.5.aarch64
bind-libs-9.11.4-26.P2.amzn2.13.5.aarch64
bind-utils-9.11.4-26.P2.amzn2.13.5.aarch64
bind-devel-9.11.4-26.P2.amzn2.13.5.aarch64
bind-lite-devel-9.11.4-26.P2.amzn2.13.5.aarch64
bind-chroot-9.11.4-26.P2.amzn2.13.5.aarch64
bind-sdb-chroot-9.11.4-26.P2.amzn2.13.5.aarch64
bind-export-libs-9.11.4-26.P2.amzn2.13.5.aarch64
bind-export-devel-9.11.4-26.P2.amzn2.13.5.aarch64
bind-debuginfo-9.11.4-26.P2.amzn2.13.5.aarch64
i686:
bind-9.11.4-26.P2.amzn2.13.5.i686
bind-pkcs11-9.11.4-26.P2.amzn2.13.5.i686
bind-pkcs11-utils-9.11.4-26.P2.amzn2.13.5.i686
bind-pkcs11-libs-9.11.4-26.P2.amzn2.13.5.i686
bind-pkcs11-devel-9.11.4-26.P2.amzn2.13.5.i686
bind-sdb-9.11.4-26.P2.amzn2.13.5.i686
bind-libs-lite-9.11.4-26.P2.amzn2.13.5.i686
bind-libs-9.11.4-26.P2.amzn2.13.5.i686
bind-utils-9.11.4-26.P2.amzn2.13.5.i686
bind-devel-9.11.4-26.P2.amzn2.13.5.i686
bind-lite-devel-9.11.4-26.P2.amzn2.13.5.i686
bind-chroot-9.11.4-26.P2.amzn2.13.5.i686
bind-sdb-chroot-9.11.4-26.P2.amzn2.13.5.i686
bind-export-libs-9.11.4-26.P2.amzn2.13.5.i686
bind-export-devel-9.11.4-26.P2.amzn2.13.5.i686
bind-debuginfo-9.11.4-26.P2.amzn2.13.5.i686
noarch:
bind-license-9.11.4-26.P2.amzn2.13.5.noarch
src:
bind-9.11.4-26.P2.amzn2.13.5.src
x86_64:
bind-9.11.4-26.P2.amzn2.13.5.x86_64
bind-pkcs11-9.11.4-26.P2.amzn2.13.5.x86_64
bind-pkcs11-utils-9.11.4-26.P2.amzn2.13.5.x86_64
bind-pkcs11-libs-9.11.4-26.P2.amzn2.13.5.x86_64
bind-pkcs11-devel-9.11.4-26.P2.amzn2.13.5.x86_64
bind-sdb-9.11.4-26.P2.amzn2.13.5.x86_64
bind-libs-lite-9.11.4-26.P2.amzn2.13.5.x86_64
bind-libs-9.11.4-26.P2.amzn2.13.5.x86_64
bind-utils-9.11.4-26.P2.amzn2.13.5.x86_64
bind-devel-9.11.4-26.P2.amzn2.13.5.x86_64
bind-lite-devel-9.11.4-26.P2.amzn2.13.5.x86_64
bind-chroot-9.11.4-26.P2.amzn2.13.5.x86_64
bind-sdb-chroot-9.11.4-26.P2.amzn2.13.5.x86_64
bind-export-libs-9.11.4-26.P2.amzn2.13.5.x86_64
bind-export-devel-9.11.4-26.P2.amzn2.13.5.x86_64
bind-debuginfo-9.11.4-26.P2.amzn2.13.5.x86_64
Red Hat: CVE-2023-3341
Mitre: CVE-2023-3341
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.9 High
AI Score
Confidence
High
0.002 Low
EPSS
Percentile
51.9%