A `named` instance configured to run as a DNSSEC-validating recursive resolver with the Aggressive Use of DNSSEC-Validated Cache (RFC 8198) option (`synth-from-dnssec`) enabled can be remotely terminated using a zone with a malformed NSEC record.
This issue affects BIND 9 versions 9.16.8-S1 through 9.16.41-S1 and 9.18.11-S1 through 9.18.15-S1.

Project Subscriptions

Vendors Products
Active Iq Unified Manager Subscribe
H300s Firmware Subscribe
H410c Firmware Subscribe
H410s Firmware Subscribe
H500s Firmware Subscribe
H700s Firmware Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2023-34280 A `named` instance configured to run as a DNSSEC-validating recursive resolver with the Aggressive Use of DNSSEC-Validated Cache (RFC 8198) option (`synth-from-dnssec`) enabled can be remotely terminated using a zone with a malformed NSEC record. This issue affects BIND 9 versions 9.16.8-S1 through 9.16.41-S1 and 9.18.11-S1 through 9.18.15-S1.
Fixes

Solution

Upgrade to the patched release most closely related to your current version of BIND 9: 9.16.42-S1 or 9.18.16-S1.


Workaround

Setting `synth-from-dnssec` to `no` prevents the problem.

History

Fri, 06 Dec 2024 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: isc

Published:

Updated: 2025-02-13T16:48:38.687Z

Reserved: 2023-05-22T07:57:43.061Z

Link: CVE-2023-2829

cve-icon Vulnrichment

Updated: 2024-08-02T06:33:05.969Z

cve-icon NVD

Status : Modified

Published: 2023-06-21T17:15:47.770

Modified: 2024-11-21T07:59:22.303

Link: CVE-2023-2829

cve-icon Redhat

Severity : Important

Publid Date: 2023-06-21T00:00:00Z

Links: CVE-2023-2829 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses