跳转到帖子

Amazon Linux 2023: CVE-2023-3341: Important priority package update for bind

recommended_posts

发布于
  • Members

Amazon Linux 2023: CVE-2023-3341: Important priority package update for bind

Severity
8
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:C)
Published
09/20/2023
Created
02/14/2025
Added
02/14/2025
Modified
02/14/2025

Description

The code that processes control channel messages sent to `named` calls certain functions recursively during packet parsing. Recursion depth is only limited by the maximum accepted packet size; depending on the environment, this may cause the packet-parsing code to run out of available stack memory, causing `named` to terminate unexpectedly. Since each incoming control channel message is fully parsed before its contents are authenticated, exploiting this flaw does not require the attacker to hold a valid RNDC key; only network access to the control channel's configured TCP port is necessary. This issue affects BIND 9 versions 9.2.0 through 9.16.43, 9.18.0 through 9.18.18, 9.19.0 through 9.19.16, 9.9.3-S1 through 9.16.43-S1, and 9.18.0-S1 through 9.18.18-S1. A flaw was found in the Bind package. The code that processes control channel messages sent to named calls certain functions recursively during packet parsing. Recursion depth is only limited by the maximum accepted packet size. Depending on the environment, this may cause the packet-parsing code to run out of available stack memory, causing named to terminate unexpectedly.

Solution(s)

  • amazon-linux-2023-upgrade-bind
  • amazon-linux-2023-upgrade-bind-chroot
  • amazon-linux-2023-upgrade-bind-debuginfo
  • amazon-linux-2023-upgrade-bind-debugsource
  • amazon-linux-2023-upgrade-bind-devel
  • amazon-linux-2023-upgrade-bind-dlz-filesystem
  • amazon-linux-2023-upgrade-bind-dlz-filesystem-debuginfo
  • amazon-linux-2023-upgrade-bind-dlz-ldap
  • amazon-linux-2023-upgrade-bind-dlz-ldap-debuginfo
  • amazon-linux-2023-upgrade-bind-dlz-mysql
  • amazon-linux-2023-upgrade-bind-dlz-mysql-debuginfo
  • amazon-linux-2023-upgrade-bind-dlz-sqlite3
  • amazon-linux-2023-upgrade-bind-dlz-sqlite3-debuginfo
  • amazon-linux-2023-upgrade-bind-dnssec-doc
  • amazon-linux-2023-upgrade-bind-dnssec-utils
  • amazon-linux-2023-upgrade-bind-dnssec-utils-debuginfo
  • amazon-linux-2023-upgrade-bind-doc
  • amazon-linux-2023-upgrade-bind-libs
  • amazon-linux-2023-upgrade-bind-libs-debuginfo
  • amazon-linux-2023-upgrade-bind-license
  • amazon-linux-2023-upgrade-bind-pkcs11
  • amazon-linux-2023-upgrade-bind-pkcs11-debuginfo
  • amazon-linux-2023-upgrade-bind-pkcs11-devel
  • amazon-linux-2023-upgrade-bind-pkcs11-libs
  • amazon-linux-2023-upgrade-bind-pkcs11-libs-debuginfo
  • amazon-linux-2023-upgrade-bind-pkcs11-utils
  • amazon-linux-2023-upgrade-bind-pkcs11-utils-debuginfo
  • amazon-linux-2023-upgrade-bind-utils
  • amazon-linux-2023-upgrade-bind-utils-debuginfo
  • amazon-linux-2023-upgrade-python3-bind

References

  • https://attackerkb.com/topics/cve-2023-3341
  • CVE - 2023-3341
  • https://alas.aws.amazon.com/AL2023/ALAS-2023-372.html
  • 查看数 707
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。
注意:你的帖子需要版主批准后才能看到。

游客
回帖…