Unknown
CVE-2023-3341
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
CVE-2023-3341
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
The code that processes control channel messages sent to named
calls certain functions recursively during packet parsing. Recursion depth is only limited by the maximum accepted packet size; depending on the environment, this may cause the packet-parsing code to run out of available stack memory, causing named
to terminate unexpectedly. Since each incoming control channel message is fully parsed before its contents are authenticated, exploiting this flaw does not require the attacker to hold a valid RNDC key; only network access to the control channel’s configured TCP port is necessary.
This issue affects BIND 9 versions 9.2.0 through 9.16.43, 9.18.0 through 9.18.18, 9.19.0 through 9.19.16, 9.9.3-S1 through 9.16.43-S1, and 9.18.0-S1 through 9.18.18-S1.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
- debian,
- fedoraproject,
- isc
Products
- bind,
- bind 9.10.5,
- bind 9.10.7,
- bind 9.11.12,
- bind 9.11.21,
- bind 9.11.27,
- bind 9.11.29,
- bind 9.11.3,
- bind 9.11.35,
- bind 9.11.37,
- bind 9.11.4,
- bind 9.11.5,
- bind 9.11.6,
- bind 9.11.7,
- bind 9.11.8,
- bind 9.16.11,
- bind 9.16.12,
- bind 9.16.13,
- bind 9.16.14,
- bind 9.16.21,
- bind 9.16.32,
- bind 9.16.36,
- bind 9.16.43,
- bind 9.16.8,
- bind 9.18.0,
- bind 9.18.18,
- bind 9.9.12,
- bind 9.9.13,
- bind 9.9.3,
- debian linux 10.0,
- debian linux 11.0,
- fedora 37,
- fedora 38
References
Miscellaneous
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: