Skip to main content

ISC Releases Security Advisories for Multiple Versions of BIND 9

Security updates for the Berkeley Internet Name Domain system

Report a cyber attack: call 0300 303 5222 or email [email protected]

Summary

Security updates for the Berkeley Internet Name Domain system


Threat details

Prior BIND versions

Versions prior to 9.11.37 and 9.11.37-S1 were not assessed, but the relevant advisory states that ISC believes that all versions of BIND 9.11 are vulnerable to CVE-2023-2828. Some even older major branches may be vulnerable as well.


Introduction

The Internet Systems Consortium (ISC) has released security updates that address three high severity vulnerabilities in multiple versions of ISC Berkeley Internet Name Domain (BIND). An attacker could exploit these vulnerabilities to cause denial-of-service conditions.


Remediation advice

Affected organisations are encouraged to review the ISC security advisories and apply the necessary updates or workarounds.


Remediation steps

Type Step
Patch

CVE-2023-2828: named's configured cache size limit can be significantly exceeded


https://kb.isc.org/v1/docs/cve-2023-2828
Patch

CVE-2023-2829: Malformed NSEC records can cause named to terminate unexpectedly when synth-from-dnssec is enabled


https://kb.isc.org/v1/docs/cve-2023-2829
Patch

CVE-2023-2911: Exceeding the recursive-clients quota may cause named to terminate unexpectedly when stale-answer-client-timeout is set to 0


https://kb.isc.org/v1/docs/cve-2023-2911

Definitive source of threat updates


CVE Vulnerabilities

Last edited: 23 June 2023 2:52 pm