HomeCyber BalkansBIND DNS system vulnerabilities allow attackers to launch DoS attacks

BIND DNS system vulnerabilities allow attackers to launch DoS attacks

Published on

spot_img

In a recent disclosure, BIND 9, a widely-used DNS (Domain Name System) server software, has been found vulnerable to two critical security flaws, labeled CVE-2023-4236 and CVE-2023-3341. These vulnerabilities, if exploited, could have serious consequences, making it imperative for users to take swift action.

The first vulnerability, CVE-2023-4236, is known as the DNS-over-TLS Query Load Vulnerability. This vulnerability arises from a flaw in the networking code responsible for handling DNS-over-TLS queries in BIND 9. When faced with a high DNS-over-TLS query load, an internal data structure is incorrectly reused, leading to an assertion failure. As a result, a vulnerable named instance may terminate unexpectedly. It is important to note that this flaw does not affect DNS-over-HTTPS code, as it employs a distinct TLS implementation. However, for those relying on DNS-over-TLS, the impact can be severe.

The second critical vulnerability, CVE-2023-3341, is referred to as Control Channel Stack Exhaustion. This flaw relates to the control channel code within BIND 9. Attackers can exploit a stack exhaustion issue by sending specially crafted messages over the control channel, which can cause names to unexpectedly terminate, resulting in potential disruption. The effectiveness of this attack is particularly pronounced in environments with limited stack memory available to each process or thread, making it difficult to predict its impact.

To address these vulnerabilities, users of BIND 9 must take immediate action. The Internet Systems Consortium (ISC), the organization behind BIND, has provided solutions to mitigate these risks. For CVE-2023-4236, users should upgrade to BIND 9.18.19 or BIND Supported Preview Edition 9.18.19-S1. Additionally, consideration should be given to disabling DNS-over-TLS connections if they are not required. For CVE-2023-3341, users should upgrade to BIND 9.16.44, 9.18.19, or 9.19.17, depending on their current version. It is also important to ensure that control-channel connections are limited to trusted IP ranges when enabling remote access.

It is worth noting that no active exploits have been reported for these vulnerabilities. However, taking proactive measures is crucial to safeguard systems against potential threats. ISC extends its gratitude to the individuals who responsibly reported these vulnerabilities. Robert Story from the USC/ISI DNS root server operations team brought CVE-2023-4236 to ISC’s attention, while Eric Sesterhenn from X41 D-Sec GmbH identified CVE-2023-3341.

In conclusion, the discovery of these vulnerabilities in BIND 9 underscores the importance of regularly updating and patching software systems. By promptly addressing these vulnerabilities and following the mitigation measures provided by ISC, users can minimize the risk of exploitation and protect their systems from potential harm. Keeping informed about the latest cybersecurity news is also crucial, and users are encouraged to follow reputable sources on platforms such as Google News, Linkedin, Twitter, and Facebook.

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...