First published: Mon Feb 12 2024(Updated: )
Last updated 24 July 2024
Credit: security-officer@isc.org security-officer@isc.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/bind | <9.16.48 | 9.16.48 |
debian/bind9 | 1:9.16.50-1~deb11u2 1:9.16.50-1~deb11u3 1:9.18.28-1~deb12u2 1:9.18.33-1~deb12u2 1:9.20.4-4 1:9.20.5-1 | |
ISC BIND 9 | >=9.16.0<=9.16.45 | |
ISC BIND 9 | =9.16.8-s1 | |
ISC BIND 9 | =9.16.11-s1 | |
ISC BIND 9 | =9.16.12-s1 | |
ISC BIND 9 | =9.16.13-s1 | |
ISC BIND 9 | =9.16.14-s1 | |
ISC BIND 9 | =9.16.21-s1 | |
ISC BIND 9 | =9.16.32-s1 | |
ISC BIND 9 | =9.16.36-s1 | |
ISC BIND 9 | =9.16.43-s1 | |
ISC BIND 9 | =9.16.45-s1 | |
NetApp Active IQ Unified Manager for VMware vSphere |
Upgrade to the patched release most closely related to your current version of BIND 9: 9.16.48 or 9.16.48-S1.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-6516 has been classified as a moderate severity vulnerability.
CVE-2023-6516 affects various versions of ISC BIND including versions from 9.16.0 up to 9.16.45.
To fix CVE-2023-6516, update ISC BIND to version 9.16.48 or later.
Yes, CVE-2023-6516 can be exploited remotely under certain conditions.
There are no known workarounds for CVE-2023-6516; updating the software is the recommended action.