First published: Tue Jun 20 2023(Updated: )
ISC BIND is vulnerable to a denial of service, caused by a flaw that allows the named's configured cache size limit to be significantly exceeded. By querying the resolver for specific RRsets in a certain order, a remote attacker could exploit this vulnerability to exhaust all memory on the host.
Credit: security-officer@isc.org security-officer@isc.org security-officer@isc.org
Affected Software | Affected Version | How to fix |
---|---|---|
IBM QRadar SIEM | <=7.5.0 - 7.5.0 UP6 | |
ubuntu/bind9 | <1:9.11.3+dfsg-1ubuntu1.19+ | 1:9.11.3+dfsg-1ubuntu1.19+ |
ubuntu/bind9 | <1:9.9.5.dfsg-3ubuntu0.19+ | 1:9.9.5.dfsg-3ubuntu0.19+ |
ubuntu/bind9 | <1:9.10.3.dfsg. | 1:9.10.3.dfsg. |
ubuntu/bind9 | <1:9.16.1-0ubuntu2.15 | 1:9.16.1-0ubuntu2.15 |
ubuntu/bind9 | <1:9.18.12-0ubuntu0.22.04.2 | 1:9.18.12-0ubuntu0.22.04.2 |
ubuntu/bind9 | <1:9.18.12-0ubuntu0.22.10.2 | 1:9.18.12-0ubuntu0.22.10.2 |
ubuntu/bind9 | <1:9.18.12-1ubuntu1.1 | 1:9.18.12-1ubuntu1.1 |
ubuntu/bind9 | <9.16.42<9.18.16<9.19.14 | 9.16.42 9.18.16 9.19.14 |
ubuntu/bind9 | <1:9.18.12-1ubuntu2 | 1:9.18.12-1ubuntu2 |
debian/bind9 | <=1:9.11.5.P4+dfsg-5.1+deb10u7 | 1:9.11.5.P4+dfsg-5.1+deb10u10 1:9.16.44-1~deb11u1 1:9.16.48-1 1:9.18.19-1~deb12u1 1:9.18.24-1 1:9.19.21-1 |
redhat/bind | <9.16.42 | 9.16.42 |
redhat/bind | <9.18.16 | 9.18.16 |
redhat/bind | <9.19.14 | 9.19.14 |
ISC BIND | >=9.11.0<=9.16.41 | |
ISC BIND | >=9.11.3<=9.16.41 | |
ISC BIND | >=9.18.0<=9.18.15 | |
ISC BIND | >=9.18.11<=9.18.15 | |
ISC BIND | >=9.19.0<=9.19.13 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 | |
Debian Debian Linux | =12.0 | |
Fedoraproject Fedora | =37 | |
Fedoraproject Fedora | =38 | |
Netapp Active Iq Unified Manager Vmware Vsphere | ||
All of | ||
Netapp H500s Firmware | ||
Netapp H500s | ||
All of | ||
Netapp H700s Firmware | ||
Netapp H700s | ||
All of | ||
Netapp H410s Firmware | ||
Netapp H410s | ||
All of | ||
Netapp H410c Firmware | ||
Netapp H410c | ||
All of | ||
Netapp H300s Firmware | ||
Netapp H300s | ||
Netapp H500s Firmware | ||
Netapp H500s | ||
Netapp H700s Firmware | ||
Netapp H700s | ||
Netapp H410s Firmware | ||
Netapp H410s | ||
Netapp H410c Firmware | ||
Netapp H410c | ||
Netapp H300s Firmware | ||
Netapp H300s |
Upgrade to the patched release most closely related to your current version of BIND 9: 9.16.42, 9.18.16, 9.19.14, 9.16.42-S1, or 9.18.16-S1.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-2828 is a vulnerability in the BIND DNS software that allows an attacker to bypass the cache validation feature and retrieve invalid data.
CVE-2023-2828 affects BIND DNS instances configured as recursive resolvers by allowing an attacker to retrieve invalid data from the cache.
CVE-2023-2828 has a severity rating of high.
To fix CVE-2023-2828, you should upgrade to a patched version of BIND DNS.
You can find more information about CVE-2023-2828 at the following references: [Reference 1](https://kb.isc.org/docs/cve-2023-2828), [Reference 2](http://www.openwall.com/lists/oss-security/2023/06/21/6), [Reference 3](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3K6AJK7RRSR53HRF5GGKPA6PDUDWOD2/)