{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-5680","assignerOrgId":"404fd4d2-a609-4245-b543-2c944a302a22","state":"PUBLISHED","assignerShortName":"isc","dateReserved":"2023-10-20T11:13:31.862Z","datePublished":"2024-02-13T14:05:19.783Z","dateUpdated":"2025-03-17T15:04:41.734Z"},"containers":{"cna":{"providerMetadata":{"orgId":"404fd4d2-a609-4245-b543-2c944a302a22","shortName":"isc","dateUpdated":"2024-05-03T13:06:10.608Z"},"title":"Cleaning an ECS-enabled cache may cause excessive CPU load","datePublic":"2024-02-13T00:00:00.000Z","affected":[{"vendor":"ISC","product":"BIND 9","versions":[{"version":"9.11.3-S1","lessThanOrEqual":"9.11.37-S1","status":"affected","versionType":"custom"},{"version":"9.16.8-S1","lessThanOrEqual":"9.16.45-S1","status":"affected","versionType":"custom"},{"version":"9.18.11-S1","lessThanOrEqual":"9.18.21-S1","status":"affected","versionType":"custom"}],"defaultStatus":"unaffected"}],"metrics":[{"cvssV3_1":{"version":"3.1","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"LOW","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","baseScore":5.3,"baseSeverity":"MEDIUM"}}],"descriptions":[{"lang":"en","value":"If a resolver cache has a very large number of ECS records stored for the same name, the process of cleaning the cache database node for this name can significantly impair query performance. \nThis issue affects BIND 9 versions 9.11.3-S1 through 9.11.37-S1, 9.16.8-S1 through 9.16.45-S1, and 9.18.11-S1 through 9.18.21-S1."}],"impacts":[{"descriptions":[{"lang":"en","value":"By sending specific queries to a resolver, an attacker can degrade `named`'s query-handling performance. In the worst-case scenario, a resolver can become entirely unresponsive."}]}],"workarounds":[{"lang":"en","value":"There is no workaround for this issue other than disabling the ECS feature entirely."}],"exploits":[{"lang":"en","value":"We are not aware of any active exploits."}],"solutions":[{"lang":"en","value":"Upgrade to the patched release most closely related to your current version of BIND 9: 9.16.48-S1 or 9.18.24-S1."}],"credits":[{"lang":"en","value":"ISC would like to thank Yann Kerherve and Ask Bjørn Hansen for bringing this vulnerability to our attention."}],"references":[{"url":"https://kb.isc.org/docs/cve-2023-5680","name":"CVE-2023-5680","tags":["vendor-advisory"]},{"url":"https://security.netapp.com/advisory/ntap-20240503-0005/"}],"source":{"discovery":"EXTERNAL"}},"adp":[{"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-noinfo Not enough information"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-02-13T18:02:52.507926Z","id":"CVE-2023-5680","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-03-17T15:04:41.734Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T08:07:32.499Z"},"title":"CVE Program Container","references":[{"url":"https://kb.isc.org/docs/cve-2023-5680","name":"CVE-2023-5680","tags":["vendor-advisory","x_transferred"]},{"url":"https://security.netapp.com/advisory/ntap-20240503-0005/","tags":["x_transferred"]}]}]}}