ISC Releases Security Advisories for Multiple Versions of BIND 9
Security updates for the Berkeley Internet Name Domain system
Summary
Security updates for the Berkeley Internet Name Domain system
Affected platforms
The following platforms are known to be affected:
Threat details
Prior BIND versions
Versions prior to 9.11.37 and 9.11.37-S1 were not assessed, but the relevant advisory states that ISC believes that all versions of BIND 9.11 are vulnerable to CVE-2023-2828. Some even older major branches may be vulnerable as well.
Introduction
The Internet Systems Consortium (ISC) has released security updates that address three high severity vulnerabilities in multiple versions of ISC Berkeley Internet Name Domain (BIND). An attacker could exploit these vulnerabilities to cause denial-of-service conditions.
Remediation advice
Affected organisations are encouraged to review the ISC security advisories and apply the necessary updates or workarounds.
Remediation steps
| Type | Step |
|---|---|
| Patch |
CVE-2023-2828: named's configured cache size limit can be significantly exceeded https://kb.isc.org/v1/docs/cve-2023-2828 |
| Patch |
CVE-2023-2829: Malformed NSEC records can cause named to terminate unexpectedly when synth-from-dnssec is enabled https://kb.isc.org/v1/docs/cve-2023-2829 |
| Patch |
CVE-2023-2911: Exceeding the recursive-clients quota may cause named to terminate unexpectedly when stale-answer-client-timeout is set to 0 https://kb.isc.org/v1/docs/cve-2023-2911 |
Definitive source of threat updates
CVE Vulnerabilities
Last edited: 23 June 2023 2:52 pm