[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249982

 
 

909

 
 

195748

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS2023-2023-240 --- bind

ID: oval:org.secpod.oval:def:19500282Date: (C)2024-01-04   (M)2024-04-25
Class: PATCHFamily: unix




A vulnerability was found in BIND. The effectiveness of the cache-cleaning algorithm used in named can be severely diminished by querying the resolver for specific RRsets in a certain order, effectively allowing the configured max-cache-size limit to exceed significantly. If the 'recursive-clients' quota is reached on a BIND 9 resolver configured with both 'stale-answer-enable yes;' and 'stale-answer-client-timeout 0;', a sequence of serve-stale-related lookups could cause 'named' to loop and terminate unexpectedly due to a stack overflow.This issue affects BIND 9 versions 9.16.33 through 9.16.41, 9.18.7 through 9.18.15, 9.16.33-S1 through 9.16.41-S1, and 9.18.11-S1 through 9.18.15-S1

Platform:
Amazon Linux 2023
Product:
bind
python3-bind
Reference:
ALAS2023-2023-240
CVE-2023-2828
CVE-2023-2911
CVE    2
CVE-2023-2911
CVE-2023-2828
CPE    2
cpe:/a:isc:bind
cpe:/a:python:python3-bind

© SecPod Technologies