CVE-2023-4236

Severity
7.5HIGH
EPSS
0.2%
top 60.80%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 20

Description

A flaw in the networking code handling DNS-over-TLS queries may cause `named` to terminate unexpectedly due to an assertion failure. This happens when internal data structures are incorrectly reused under significant DNS-over-TLS query load. This issue affects BIND 9 versions 9.18.0 through 9.18.18 and 9.18.11-S1 through 9.18.18-S1.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages4 packages

NVDisc/bind9.18.09.18.18+2
Alpinebind< 9.18.19-r0+6
Debianbind9< 1:9.18.19-1~deb12u1+2
CVEListV5isc/bind_99.18.09.18.18+1

Also affects: Debian Linux 10.0, 11.0, Fedora 37, 38, 39

🔴Vulnerability Details

5
OSV
CVE-2023-4236: A flaw in the networking code handling DNS-over-TLS queries may cause `named` to terminate unexpectedly due to an assertion failure2023-09-20
CVEList
named may terminate unexpectedly under high DNS-over-TLS query load2023-09-20
OSV
CVE-2023-4236: A flaw in the networking code handling DNS-over-TLS queries may cause `named` to terminate unexpectedly due to an assertion failure2023-09-20
GHSA
GHSA-jhh4-vhhc-xpjq: A flaw in the networking code handling DNS-over-TLS queries may cause `named` to terminate unexpectedly due to an assertion failure2023-09-20
OSV
bind9 vulnerabilities2023-09-20

📋Vendor Advisories

3
Red Hat
bind: an assertion failure may lead to DoS2023-09-20
Ubuntu
Bind vulnerabilities2023-09-20
Debian
CVE-2023-4236: bind9 - A flaw in the networking code handling DNS-over-TLS queries may cause `named` to...2023