In a recent disclosure, BIND 9, a widely-used DNS (Domain Name System) server software, has been found vulnerable to two critical security flaws, labeled CVE-2023-4236 and CVE-2023-3341. These vulnerabilities, if exploited, could have serious consequences, making it imperative for users to take swift action.
The first vulnerability, CVE-2023-4236, is known as the DNS-over-TLS Query Load Vulnerability. This vulnerability arises from a flaw in the networking code responsible for handling DNS-over-TLS queries in BIND 9. When faced with a high DNS-over-TLS query load, an internal data structure is incorrectly reused, leading to an assertion failure. As a result, a vulnerable named instance may terminate unexpectedly. It is important to note that this flaw does not affect DNS-over-HTTPS code, as it employs a distinct TLS implementation. However, for those relying on DNS-over-TLS, the impact can be severe.
The second critical vulnerability, CVE-2023-3341, is referred to as Control Channel Stack Exhaustion. This flaw relates to the control channel code within BIND 9. Attackers can exploit a stack exhaustion issue by sending specially crafted messages over the control channel, which can cause names to unexpectedly terminate, resulting in potential disruption. The effectiveness of this attack is particularly pronounced in environments with limited stack memory available to each process or thread, making it difficult to predict its impact.
To address these vulnerabilities, users of BIND 9 must take immediate action. The Internet Systems Consortium (ISC), the organization behind BIND, has provided solutions to mitigate these risks. For CVE-2023-4236, users should upgrade to BIND 9.18.19 or BIND Supported Preview Edition 9.18.19-S1. Additionally, consideration should be given to disabling DNS-over-TLS connections if they are not required. For CVE-2023-3341, users should upgrade to BIND 9.16.44, 9.18.19, or 9.19.17, depending on their current version. It is also important to ensure that control-channel connections are limited to trusted IP ranges when enabling remote access.
It is worth noting that no active exploits have been reported for these vulnerabilities. However, taking proactive measures is crucial to safeguard systems against potential threats. ISC extends its gratitude to the individuals who responsibly reported these vulnerabilities. Robert Story from the USC/ISI DNS root server operations team brought CVE-2023-4236 to ISC’s attention, while Eric Sesterhenn from X41 D-Sec GmbH identified CVE-2023-3341.
In conclusion, the discovery of these vulnerabilities in BIND 9 underscores the importance of regularly updating and patching software systems. By promptly addressing these vulnerabilities and following the mitigation measures provided by ISC, users can minimize the risk of exploitation and protect their systems from potential harm. Keeping informed about the latest cybersecurity news is also crucial, and users are encouraged to follow reputable sources on platforms such as Google News, Linkedin, Twitter, and Facebook.
