7.5
CWE
191
Advisory Published
CVE Published
Updated

CVE-2023-31137: MaraDNS Integer Underflow Vulnerability in DNS Packet Decompression

First published: Tue May 09 2023(Updated: )

MaraDNS is open-source software that implements the Domain Name System (DNS). In version 3.5.0024 and prior, a remotely exploitable integer underflow vulnerability in the DNS packet decompression function allows an attacker to cause a Denial of Service by triggering an abnormal program termination. The vulnerability exists in the `decomp_get_rddata` function within the `Decompress.c` file. When handling a DNS packet with an Answer RR of qtype 16 (TXT record) and any qclass, if the `rdlength` is smaller than `rdata`, the result of the line `Decompress.c:886` is a negative number `len = rdlength - total;`. This value is then passed to the `decomp_append_bytes` function without proper validation, causing the program to attempt to allocate a massive chunk of memory that is impossible to allocate. Consequently, the program exits with an error code of 64, causing a Denial of Service. One proposed fix for this vulnerability is to patch `Decompress.c:887` by breaking `if(len <= 0)`, which has been incorporated in version 3.5.0036 via commit bab062bde40b2ae8a91eecd522e84d8b993bab58.

Credit: security-advisories@github.com security-advisories@github.com security-advisories@github.com

Affected SoftwareAffected VersionHow to fix
Maradns Maradns<=3.5.0024
debian/maradns<=2.0.13-1.4<=2.0.13-1.2
2.0.13-1.4+deb11u1
2.0.13-1.5
ubuntu/maradns<2.0.13-1.4+
2.0.13-1.4+
ubuntu/maradns<2.0.13-1ubuntu0.1~
2.0.13-1ubuntu0.1~
ubuntu/maradns<2.0.13-1.2ubuntu0.1~
2.0.13-1.2ubuntu0.1~
ubuntu/maradns<2.0.13-1.4+
2.0.13-1.4+
ubuntu/maradns<2.0.13-1.4+
2.0.13-1.4+
debian/maradns<=2.0.13-1.2
2.0.13-1.2+deb10u1
2.0.13-1.4+deb11u1
2.0.13-1.6
Maradns Maradns<3.4.10
Maradns Maradns>=3.5.0001<3.5.0036
Fedoraproject Fedora=37
Fedoraproject Fedora=38
Debian Debian Linux=10.0
Debian Debian Linux=11.0

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Parent vulnerabilities

(Appears in the following advisories)

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203