Executive Summary

Informations
Name CVE-2023-2828 First vendor Publication 2023-06-21
Vendor Cve Last vendor Modification 2024-11-21

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

Every `named` instance configured to run as a recursive resolver maintains a cache database holding the responses to the queries it has recently sent to authoritative servers. The size limit for that cache database can be configured using the `max-cache-size` statement in the configuration file; it defaults to 90% of the total amount of memory available on the host. When the size of the cache reaches 7/8 of the configured limit, a cache-cleaning algorithm starts to remove expired and/or least-recently used RRsets from the cache, to keep memory use below the configured limit.

It has been discovered that the effectiveness of the cache-cleaning algorithm used in `named` can be severely diminished by querying the resolver for specific RRsets in a certain order, effectively allowing the configured `max-cache-size` limit to be significantly exceeded. This issue affects BIND 9 versions 9.11.0 through 9.16.41, 9.18.0 through 9.18.15, 9.19.0 through 9.19.13, 9.11.3-S1 through 9.16.41-S1, and 9.18.11-S1 through 9.18.15-S1.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2828

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-770 Allocation of Resources Without Limits or Throttling

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 675
Application 1
Os 3
Os 2

Sources (Detail)

http://www.openwall.com/lists/oss-security/2023/06/21/6
https://kb.isc.org/docs/cve-2023-2828
https://lists.debian.org/debian-lts-announce/2023/07/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedorapr...
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedorapr...
https://security.netapp.com/advisory/ntap-20230703-0010/
https://www.debian.org/security/2023/dsa-5439
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
Date Informations
2024-11-28 14:23:56
  • Multiple Updates
2024-10-23 02:47:02
  • Multiple Updates
2024-08-02 13:47:21
  • Multiple Updates
2024-08-02 01:32:44
  • Multiple Updates
2024-02-02 02:44:37
  • Multiple Updates
2024-02-01 12:29:50
  • Multiple Updates
2023-12-01 02:31:35
  • Multiple Updates
2023-09-23 02:27:52
  • Multiple Updates
2023-09-05 13:40:03
  • Multiple Updates
2023-09-05 01:29:03
  • Multiple Updates
2023-09-02 13:38:17
  • Multiple Updates
2023-09-02 01:29:30
  • Multiple Updates
2023-08-12 13:43:40
  • Multiple Updates
2023-08-12 01:28:45
  • Multiple Updates
2023-08-11 13:35:02
  • Multiple Updates
2023-08-11 01:29:38
  • Multiple Updates
2023-08-06 13:32:17
  • Multiple Updates
2023-08-06 01:28:23
  • Multiple Updates
2023-08-04 13:32:44
  • Multiple Updates
2023-08-04 01:28:48
  • Multiple Updates
2023-07-22 00:27:31
  • Multiple Updates
2023-07-19 17:27:28
  • Multiple Updates
2023-07-14 13:32:32
  • Multiple Updates
2023-07-14 01:28:25
  • Multiple Updates
2023-07-04 00:27:32
  • Multiple Updates
2023-07-03 21:27:32
  • Multiple Updates
2023-06-30 09:27:32
  • Multiple Updates
2023-06-26 13:27:30
  • Multiple Updates
2023-06-25 09:27:18
  • Multiple Updates
2023-06-22 00:27:20
  • Multiple Updates
2023-06-21 21:27:16
  • First insertion