HomeCyber BalkansBIND DNS system vulnerabilities allow attackers to launch DoS attacks

BIND DNS system vulnerabilities allow attackers to launch DoS attacks

Published on

spot_img

In a recent disclosure, BIND 9, a widely-used DNS (Domain Name System) server software, has been found vulnerable to two critical security flaws, labeled CVE-2023-4236 and CVE-2023-3341. These vulnerabilities, if exploited, could have serious consequences, making it imperative for users to take swift action.

The first vulnerability, CVE-2023-4236, is known as the DNS-over-TLS Query Load Vulnerability. This vulnerability arises from a flaw in the networking code responsible for handling DNS-over-TLS queries in BIND 9. When faced with a high DNS-over-TLS query load, an internal data structure is incorrectly reused, leading to an assertion failure. As a result, a vulnerable named instance may terminate unexpectedly. It is important to note that this flaw does not affect DNS-over-HTTPS code, as it employs a distinct TLS implementation. However, for those relying on DNS-over-TLS, the impact can be severe.

The second critical vulnerability, CVE-2023-3341, is referred to as Control Channel Stack Exhaustion. This flaw relates to the control channel code within BIND 9. Attackers can exploit a stack exhaustion issue by sending specially crafted messages over the control channel, which can cause names to unexpectedly terminate, resulting in potential disruption. The effectiveness of this attack is particularly pronounced in environments with limited stack memory available to each process or thread, making it difficult to predict its impact.

To address these vulnerabilities, users of BIND 9 must take immediate action. The Internet Systems Consortium (ISC), the organization behind BIND, has provided solutions to mitigate these risks. For CVE-2023-4236, users should upgrade to BIND 9.18.19 or BIND Supported Preview Edition 9.18.19-S1. Additionally, consideration should be given to disabling DNS-over-TLS connections if they are not required. For CVE-2023-3341, users should upgrade to BIND 9.16.44, 9.18.19, or 9.19.17, depending on their current version. It is also important to ensure that control-channel connections are limited to trusted IP ranges when enabling remote access.

It is worth noting that no active exploits have been reported for these vulnerabilities. However, taking proactive measures is crucial to safeguard systems against potential threats. ISC extends its gratitude to the individuals who responsibly reported these vulnerabilities. Robert Story from the USC/ISI DNS root server operations team brought CVE-2023-4236 to ISC’s attention, while Eric Sesterhenn from X41 D-Sec GmbH identified CVE-2023-3341.

In conclusion, the discovery of these vulnerabilities in BIND 9 underscores the importance of regularly updating and patching software systems. By promptly addressing these vulnerabilities and following the mitigation measures provided by ISC, users can minimize the risk of exploitation and protect their systems from potential harm. Keeping informed about the latest cybersecurity news is also crucial, and users are encouraged to follow reputable sources on platforms such as Google News, Linkedin, Twitter, and Facebook.

Source link

Latest articles

ThreatsDay Bulletin: Defender 0-Day, SonicWall Brute-Force, 17-Year-Old Excel RCE, and 15 Additional Stories

Cybersecurity Weekly Recap: A Rollercoaster of Breaches, Updates, and Vulnerabilities Thursday mornings can sometimes deliver...

RCE by Design: MCP Architectural Choices Impacting the AI Agent Ecosystem

Concerns Over MCP Configuration Security in AI Development In a landscape increasingly dominated by artificial...

Cisco Systems Releases Three Advisories Addressing Critical Vulnerabilities in Webex and ISE

Vulnerability in Cisco’s Cloud Service Highlights Importance of Identity and Access Management In a recent...

Cargo Theft by Hackers Involves Sophisticated Remote Access Campaigns, Researchers Discover

In a compelling disclosure, security researchers at Proofpoint have highlighted the alarming activities of...

More like this

ThreatsDay Bulletin: Defender 0-Day, SonicWall Brute-Force, 17-Year-Old Excel RCE, and 15 Additional Stories

Cybersecurity Weekly Recap: A Rollercoaster of Breaches, Updates, and Vulnerabilities Thursday mornings can sometimes deliver...

RCE by Design: MCP Architectural Choices Impacting the AI Agent Ecosystem

Concerns Over MCP Configuration Security in AI Development In a landscape increasingly dominated by artificial...

Cisco Systems Releases Three Advisories Addressing Critical Vulnerabilities in Webex and ISE

Vulnerability in Cisco’s Cloud Service Highlights Importance of Identity and Access Management In a recent...