CVE Vulnerabilities

CVE-2023-5517

Reachable Assertion

Published: Feb 13, 2024 | Modified: Nov 21, 2024
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
7.5 IMPORTANT
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

A flaw in query-handling code can cause named to exit prematurely with an assertion failure when:

  • nxdomain-redirect <domain>; is configured, and
  • the resolver receives a PTR query for an RFC 1918 address that would normally result in an authoritative NXDOMAIN response. This issue affects BIND 9 versions 9.12.0 through 9.16.45, 9.18.0 through 9.18.21, 9.19.0 through 9.19.19, 9.16.8-S1 through 9.16.45-S1, and 9.18.11-S1 through 9.18.21-S1.

Weakness

The product contains an assert() or similar statement that can be triggered by an attacker, which leads to an application exit or other behavior that is more severe than necessary.

Affected Software

NameVendorStart VersionEnd Version
Active_iq_unified_managerNetapp- (including)- (including)
FedoraFedoraproject38 (including)38 (including)
FedoraFedoraproject39 (including)39 (including)
Red Hat Enterprise Linux 8RedHatbind9.16-32:9.16.23-0.16.el8_9.2*
Red Hat Enterprise Linux 8.6 Extended Update SupportRedHatbind9.16-32:9.16.23-0.7.el8_6.5*
Red Hat Enterprise Linux 8.8 Extended Update SupportRedHatbind9.16-32:9.16.23-0.14.el8_8.4*
Red Hat Enterprise Linux 9RedHatbind-32:9.16.23-14.el9_3.4*
Red Hat Enterprise Linux 9RedHatbind-dyndb-ldap-0:11.9-8.el9_3.3*
Red Hat Enterprise Linux 9RedHatbind-32:9.16.23-18.el9_4.1*
Red Hat Enterprise Linux 9RedHatbind-dyndb-ldap-0:11.9-9.el9_4*
Red Hat Enterprise Linux 9.0 Extended Update SupportRedHatbind-32:9.16.23-1.el9_0.5*
Red Hat Enterprise Linux 9.0 Extended Update SupportRedHatbind-dyndb-ldap-0:11.9-7.el9_0.1*
Red Hat Enterprise Linux 9.2 Extended Update SupportRedHatbind-32:9.16.23-11.el9_2.4*
Red Hat Enterprise Linux 9.2 Extended Update SupportRedHatbind-dyndb-ldap-0:11.9-8.el9_2.2*
Bind9Ubuntubionic*
Bind9Ubuntudevel*
Bind9Ubuntuesm-infra/focal*
Bind9Ubuntufocal*
Bind9Ubuntujammy*
Bind9Ubuntumantic*
Bind9Ubuntunoble*
Bind9Ubuntuoracular*
Bind9Ubuntuplucky*
Bind9Ubuntutrusty*
Bind9Ubuntutrusty/esm*
Bind9Ubuntuupstream*
Bind9Ubuntuxenial*

Extended Description

While assertion is good for catching logic errors and reducing the chances of reaching more serious vulnerability conditions, it can still lead to a denial of service. For example, if a server handles multiple simultaneous connections, and an assert() occurs in one single connection that causes all other connections to be dropped, this is a reachable assertion that leads to a denial of service.

Potential Mitigations

References