Remotely Exploitable DoS Vulnerabilities Patched in BIND

94 views 1 minutes read

Remotely Exploitable DoS Vulnerabilities Patched in BIND: The Internet Systems Consortium (ISC) has recently released patches to address three high-severity vulnerabilities in BIND, the DNS software suite.

These vulnerabilities could be remotely exploited, leading to denial-of-service (DoS) attacks. The patches aim to prevent exhaustion of memory and crashes in the BIND daemon, named.

Key Takeaways to Remotely Exploitable DoS Vulnerabilities Patched in BIND:

  • ISC has released patches to address three high-severity vulnerabilities in BIND, the DNS software suite.
  • These vulnerabilities could be exploited remotely, resulting in denial-of-service (DoS) attacks by exhausting memory or causing crashes in the BIND daemon, named.
  • BIND versions 9.16.42, 9.18.16, and 9.19.14, as well as BIND Supported Preview Edition versions 9.16.42-S1 and 9.18.16-S1, include the necessary fixes for the vulnerabilities.

The Internet Systems Consortium (ISC) has released patches to address three high-severity denial-of-service (DoS) vulnerabilities in the BIND DNS software suite.

These vulnerabilities tracked as CVE-2023-2828, CVE-2023-2829, and CVE-2023-2911, can be exploited remotely and have the potential to exhaust memory or crash the BIND daemon, named.

Vulnerability 1: CVE-2023-2828 – Memory Cache Exhaustion

The first vulnerability, CVE-2023-2828, affects a named function responsible for memory cache cleaning in BIND. The cache-cleaning algorithm’s effectiveness can be significantly reduced when certain RRsets are queried in a specific order.

An attacker can exploit this flaw to cause names to exceed the maximum allowed memory usage. If the default configuration is utilized, this can lead to a complete exhaustion of available memory, resulting in a DoS condition.

Vulnerability 2: CVE-2023-2829 – Termination of Named

The second vulnerability, CVE-2023-2829, impacts named instances configured as a DNSSEC-validating recursive resolver with the “Aggressive Use of DNSSEC-Validated Cache” option enabled. By sending specific queries to the resolver, a remote attacker can cause a name to terminate unexpectedly.

This option is enabled by default in BIND versions 9.18 and 9.18-S, but disabled in earlier versions unless explicitly enabled. Disabling the option can prevent this issue.

Vulnerability 3: CVE-2023-2911 – Recursive Client Quota and Stale Answers

The third vulnerability, CVE-2023-2911, affects BIND 9 resolvers that reach the quota of recursive clients, specifically when configured to return ‘stale’ cached answers using the ‘stale-answer-client-timeout 0;’ option.

Through a sequence of serve-stale-related lookups, an attacker can trigger a name to enter a loop and crash. Changing the value of ‘stale-answer-client-timeout’ can mitigate this vulnerability.

Patch Release and Version Updates

To address these vulnerabilities, ISC has released BIND versions 9.16.42, 9.18.16, and 9.19.14, as well as BIND Supported Preview Edition versions 9.16.42-S1 and 9.18.16-S1. It is recommended to update to these versions to apply the necessary fixes and ensure the security of BIND installations.

Conclusion

The release of patches by the Internet Systems Consortium (ISC) addresses three high-severity vulnerabilities in BIND, preventing potential denial-of-service (DoS) attacks.

System administrators and BIND users are strongly advised to update to the latest versions to protect their systems from exploitation. Prompt installation of the patches will help maintain the stability

Leave a Comment

About Us

CyberSecurityCue provides valuable insights, guidance, and updates to individuals, professionals, and businesses interested in the ever-evolving field of cybersecurity. Let us be your trusted source for all cybersecurity-related information.

Editors' Picks

Trending News

©2010 – 2023 – All Right Reserved | Designed & Powered by HostAdvocate

CyberSecurityCue (Cyber Security Cue) Logo
Subscribe To Our Newsletter

Subscribe To Our Newsletter

Join our mailing list for the latest news and updates.

You have Successfully Subscribed!

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Accept Read More