CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
AI Score
Confidence
High
EPSS
Percentile
51.8%
USN-6183-1 fixed vulnerabilities in Bind. This update provides the
corresponding updates for Ubuntu 14.04 LTS, Ubuntu 16.04 LTS and Ubuntu 18.04
LTS.
Original advisory details:
Shoham Danino, Anat Bremler-Barr, Yehuda Afek, and Yuval Shavitt discovered
that Bind incorrectly handled the cache size limit. A remote attacker could
possibly use this issue to consume memory, leading to a denial of service.
(CVE-2023-2828)
It was discovered that Bind incorrectly handled the recursive-clients
quota. A remote attacker could possibly use this issue to cause Bind to
crash, resulting in a denial of service. This issue only affected Ubuntu
22.04 LTS, Ubuntu 22.10, and Ubuntu 23.04. (CVE-2023-2911)
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 18.04 | noarch | bind9 | < 1:9.11.3+dfsg-1ubuntu1.19+esm1 | UNKNOWN |
Ubuntu | 18.04 | noarch | bind9 | < 1:9.11.3+dfsg-1ubuntu1.19 | UNKNOWN |
Ubuntu | 18.04 | noarch | bind9-dbgsym | < 1:9.11.3+dfsg-1ubuntu1.19 | UNKNOWN |
Ubuntu | 18.04 | noarch | bind9-doc | < 1:9.11.3+dfsg-1ubuntu1.19 | UNKNOWN |
Ubuntu | 18.04 | noarch | bind9-host | < 1:9.11.3+dfsg-1ubuntu1.19 | UNKNOWN |
Ubuntu | 18.04 | noarch | bind9-host-dbgsym | < 1:9.11.3+dfsg-1ubuntu1.19 | UNKNOWN |
Ubuntu | 18.04 | noarch | bind9utils | < 1:9.11.3+dfsg-1ubuntu1.19 | UNKNOWN |
Ubuntu | 18.04 | noarch | bind9utils-dbgsym | < 1:9.11.3+dfsg-1ubuntu1.19 | UNKNOWN |
Ubuntu | 18.04 | noarch | dnsutils | < 1:9.11.3+dfsg-1ubuntu1.19 | UNKNOWN |
Ubuntu | 18.04 | noarch | dnsutils-dbgsym | < 1:9.11.3+dfsg-1ubuntu1.19 | UNKNOWN |