NA

CVE-2023-31137

Published: 09/05/2023 Updated: 07/03/2024
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 0

Vulnerability Summary

MaraDNS is open-source software that implements the Domain Name System (DNS). In version 3.5.0024 and prior, a remotely exploitable integer underflow vulnerability in the DNS packet decompression function allows an malicious user to cause a Denial of Service by triggering an abnormal program termination. The vulnerability exists in the `decomp_get_rddata` function within the `Decompress.c` file. When handling a DNS packet with an Answer RR of qtype 16 (TXT record) and any qclass, if the `rdlength` is smaller than `rdata`, the result of the line `Decompress.c:886` is a negative number `len = rdlength - total;`. This value is then passed to the `decomp_append_bytes` function without proper validation, causing the program to attempt to allocate a massive chunk of memory that is impossible to allocate. Consequently, the program exits with an error code of 64, causing a Denial of Service. One proposed fix for this vulnerability is to patch `Decompress.c:887` by breaking `if(len <= 0)`, which has been incorporated in version 3.5.0036 via commit bab062bde40b2ae8a91eecd522e84d8b993bab58.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

maradns maradns

fedoraproject fedora 37

fedoraproject fedora 38

debian debian linux 10.0

debian debian linux 11.0

Vendor Advisories

Debian Bug report logs - #1035936 maradns: CVE-2023-31137 Package: src:maradns; Maintainer for src:maradns is Dariusz Dwornikowski &lt;dariuszdwornikowski@csputpoznanpl&gt;; Reported by: Moritz Mühlenhoff &lt;jmm@inutilorg&gt; Date: Thu, 11 May 2023 12:15:02 UTC Severity: important Tags: security, upstream Reply or s ...
Two vulnerbilities were found in maradns, an open source domain name system (DNS) implementation, that may lead to denial of service and unintended domain name resolution For the oldstable distribution (bullseye), these problems have been fixed in version 2013-14+deb11u1 We recommend that you upgrade your maradns packages For the detailed sec ...