High-Severity BIND DNS Flaw Let Attackers Exploit Remotely
Security fixes were issued that tackle three high-severity vulnerabilities in several variations of the Internet Methods Consortium (ISC’s) Berkeley Internet Title Domain (BIND DNS Flaw) 9.
An attacker could possibly exploit these flaws remotely to consequence in denial-of-service prerequisites presumably.
BIND 9 is an open-provide and entirely featured comprehensive DNS scheme. BIND 9 would be configured as an authoritative name server, a resolver, and, on supported hosts, a stub resolver (via its name. conf file) BIND DNS Flaw.
The BIND DNS is used in predominant financial institutions, nationwide & global carriers, ISPs, retailers, producers, Universities, and Authorities organizations.
Vulnerabilities
- CVE-2023-2828
- CVE-2023-2829
- CVE-2023-2911
CVE-2023-2828, named’s configured cache size limit would be a great deal exceeded.
An attacker can use this effort to trigger the amount of memory a named resolver utilizes to exceed the draw max-cache-size limit.
The attack’s success is decided by numerous parameters (e.g., request load, request patterns). Peaceable, for the reason that default imprint of the max-cache-size commentary is 90%, the attacker can utilize all accessible memory on the host running named, ensuing in a denial-of-service area.
Versions Affected:
BIND
- 9.11.0 -> 9.16.41
- 9.18.0 -> 9.18.15
- 9.19.0 -> 9.19.13
BIND Supported Preview Edition
- 9.11.3-S1 -> 9.16.41-S1
- 9.18.11-S1 -> 9.18.15-S1
Solution
Upgrade to the patched open most intently linked to your most modern version of BIND 9:
- 9.16.42
- 9.18.16
- 9.19.14
BIND Supported Preview Edition
- 9.16.42-S1
- 9.18.16-S1
CVE-2023-2829, malformed NSEC recordsdata can trigger names to terminate when synth-from-dnssec is enabled.
An attacker can trigger the name to terminate all straight away by submitting particular queries to the resolver.
Versions Affected:
BIND Supported Preview Edition
- 9.16.8-S1 -> 9.16.41-S1
- 9.18.11-S1 -> 9.18.15-S1
Solution:
BIND Supported Preview Edition:
- 9.16.42-S1
- 9.18.16-S1
CVE-2023-2911, exceeding the recursive-prospects quota, could possibly trigger the name to terminate when former-acknowledge-client-timeout is decided to 0.
By sending explain queries to the resolver, an attacker can trigger the name to terminate .
Versions Affected:
BIND
- 9.16.33 -> 9.16.41
- 9.18.7 -> 9.18.15
BIND Supported Preview Edition
- 9.16.33-S1 -> 9.16.41-S1
- 9.18.11-S1 -> 9.18.15-S1
Solution:
Upgrade to the patched open most intently linked to your most modern version of BIND 9:
- 9.16.42
- 9.18.16
BIND Supported Preview Edition:
- 9.16.42-S1
- 9.18.16-S1
Resulting from this truth, affected firms must nonetheless look for the ISC security warnings and put into effect wanted upgrades or fixes.
Source credit : cybersecuritynews.com