CVE-2023-31137Integer Underflow (Wrap or Wraparound) in Maradns

Severity
7.5HIGHNVD
EPSS
1.2%
top 20.65%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 9
Latest updateAug 3

Description

MaraDNS is open-source software that implements the Domain Name System (DNS). In version 3.5.0024 and prior, a remotely exploitable integer underflow vulnerability in the DNS packet decompression function allows an attacker to cause a Denial of Service by triggering an abnormal program termination. The vulnerability exists in the `decomp_get_rddata` function within the `Decompress.c` file. When handling a DNS packet with an Answer RR of qtype 16 (TXT record) and any qclass, if the `rdlength` is

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages5 packages

debiandebian/maradns< maradns 2.0.13-1.4+deb11u1 (bullseye)
NVDmaradns/maradns3.5.00013.5.0036+1
Debianmaradns/maradns< 2.0.13-1.4+deb11u1
Ubuntumaradns/maradns< 2.0.13-1.4+deb11u1build0.20.04.1+3
CVEListV5samboy/maradns3.5.0024

Also affects: Debian Linux 10.0, 11.0, Fedora 37, 38

Patches

🔴Vulnerability Details

2
OSV
maradns vulnerabilities2023-08-03
OSV
CVE-2023-31137: MaraDNS is open-source software that implements the Domain Name System (DNS)2023-05-09

📋Vendor Advisories

2
Ubuntu
MaraDNS vulnerabilities2023-08-03
Debian
CVE-2023-31137: maradns - MaraDNS is open-source software that implements the Domain Name System (DNS). In...2023
CVE-2023-31137 — Integer Underflow (Wrap or Wraparound) | cvebase