A flaw in the networking code handling DNS-over-TLS queries may cause `named` to terminate unexpectedly due to an assertion failure. This happens when internal data structures are incorrectly reused under significant DNS-over-TLS query load.
This issue affects BIND 9 versions 9.18.0 through 9.18.18 and 9.18.11-S1 through 9.18.18-S1.

Project Subscriptions

Vendors Products
Debian Linux Subscribe
Fedoraproject Subscribe
H300s Firmware Subscribe
H410c Firmware Subscribe
H410s Firmware Subscribe
H500s Firmware Subscribe
H700s Firmware Subscribe
Advisories
Source ID Title
Debian DSA Debian DSA DSA-5504-1 bind9 security update
EUVD EUVD EUVD-2023-54109 A flaw in the networking code handling DNS-over-TLS queries may cause `named` to terminate unexpectedly due to an assertion failure. This happens when internal data structures are incorrectly reused under significant DNS-over-TLS query load. This issue affects BIND 9 versions 9.18.0 through 9.18.18 and 9.18.11-S1 through 9.18.18-S1.
Ubuntu USN Ubuntu USN USN-6390-1 Bind vulnerabilities
Fixes

Solution

Upgrade to the patched release most closely related to your current version of BIND 9: 9.18.19 or 9.18.19-S1.


Workaround

Disabling listening for DNS-over-TLS connections (by removing `listen-on ... tls ... { ... };` statements from the configuration) prevents the affected code paths from being taken, rendering exploitation impossible. However, there is no workaround for this flaw if DNS-over-TLS support is required.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: isc

Published:

Updated: 2025-02-13T17:09:18.327Z

Reserved: 2023-08-08T10:23:50.680Z

Link: CVE-2023-4236

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2023-09-20T13:15:12.313

Modified: 2024-11-21T08:34:41.190

Link: CVE-2023-4236

cve-icon Redhat

Severity : Important

Publid Date: 2023-09-20T00:00:00Z

Links: CVE-2023-4236 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses