NA

CVE-2023-4408

Published: 13/02/2024 Updated: 26/04/2024
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 0

Vulnerability Summary

The DNS message parsing code in `named` includes a section whose computational complexity is overly high. It does not cause problems for typical DNS traffic, but crafted queries and responses may cause excessive CPU load on the affected `named` instance by exploiting this flaw. This issue affects both authoritative servers and recursive resolvers. This issue affects BIND 9 versions 9.0.0 up to and including 9.16.45, 9.18.0 up to and including 9.18.21, 9.19.0 up to and including 9.19.19, 9.9.3-S1 up to and including 9.11.37-S1, 9.16.8-S1 up to and including 9.16.45-S1, and 9.18.11-S1 up to and including 9.18.21-S1.

Vulnerability Trend

Vendor Advisories

Description<!---->A flaw was found in the bind package This issue may allow a remote attacker with no specific privileges to craft a specially long DNS message leading to an excessive and uncontrolled CPU usage, the server being unavailable, and a Denial of ServiceA flaw was found in the bind package This issue may allow a remote attacker with n ...