{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-6516","assignerOrgId":"404fd4d2-a609-4245-b543-2c944a302a22","state":"PUBLISHED","assignerShortName":"isc","dateReserved":"2023-12-05T10:44:59.435Z","datePublished":"2024-02-13T14:05:28.933Z","dateUpdated":"2025-02-13T17:26:26.170Z"},"containers":{"cna":{"providerMetadata":{"orgId":"404fd4d2-a609-4245-b543-2c944a302a22","shortName":"isc","dateUpdated":"2024-05-03T13:06:07.107Z"},"title":"Specific recursive query patterns may lead to an out-of-memory condition","datePublic":"2024-02-13T00:00:00.000Z","affected":[{"vendor":"ISC","product":"BIND 9","versions":[{"version":"9.16.0","lessThanOrEqual":"9.16.45","status":"affected","versionType":"custom"},{"version":"9.16.8-S1","lessThanOrEqual":"9.16.45-S1","status":"affected","versionType":"custom"}],"defaultStatus":"unaffected"}],"metrics":[{"cvssV3_1":{"version":"3.1","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH"}}],"descriptions":[{"lang":"en","value":"To keep its cache database efficient, `named` running as a recursive resolver occasionally attempts to clean up the database. It uses several methods, including some that are asynchronous: a small chunk of memory pointing to the cache element that can be cleaned up is first allocated and then queued for later processing. It was discovered that if the resolver is continuously processing query patterns triggering this type of cache-database maintenance, `named` may not be able to handle the cleanup events in a timely manner. This in turn enables the list of queued cleanup events to grow infinitely large over time, allowing the configured `max-cache-size` limit to be significantly exceeded.\nThis issue affects BIND 9 versions 9.16.0 through 9.16.45 and 9.16.8-S1 through 9.16.45-S1."}],"impacts":[{"descriptions":[{"lang":"en","value":"By exploiting this flaw, an attacker can cause the amount of memory used by a `named` resolver to go well beyond the configured `max-cache-size` limit. The effectiveness of the attack depends on a number of environmental factors, but in the worst case the attacker can exhaust all available memory on the host running `named`, leading to a denial-of-service condition."}]}],"workarounds":[{"lang":"en","value":"No workarounds known."}],"exploits":[{"lang":"en","value":"We are not aware of any active exploits."}],"solutions":[{"lang":"en","value":"Upgrade to the patched release most closely related to your current version of BIND 9: 9.16.48 or 9.16.48-S1."}],"credits":[{"lang":"en","value":"ISC would like to thank Infoblox for bringing this vulnerability to our attention."}],"references":[{"url":"https://kb.isc.org/docs/cve-2023-6516","name":"CVE-2023-6516","tags":["vendor-advisory"]},{"url":"http://www.openwall.com/lists/oss-security/2024/02/13/1"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PNNHZSZPG2E7NBMBNYPGHCFI4V4XRWNQ/"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R/"},{"url":"https://security.netapp.com/advisory/ntap-20240503-0008/"}],"source":{"discovery":"EXTERNAL"}},"adp":[{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-789","lang":"en","description":"CWE-789 Memory Allocation with Excessive Size Value"}]}],"affected":[{"vendor":"isc","product":"bind","cpes":["cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"9.16.0","status":"affected","lessThanOrEqual":"9.16.45","versionType":"custom"},{"version":"9.16.8-s1","status":"affected","lessThanOrEqual":"9.16.45-s1","versionType":"custom"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-02-20T16:01:15.527012Z","id":"CVE-2023-6516","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-06-28T16:35:10.580Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T08:35:13.212Z"},"title":"CVE Program Container","references":[{"url":"https://kb.isc.org/docs/cve-2023-6516","name":"CVE-2023-6516","tags":["vendor-advisory","x_transferred"]},{"url":"http://www.openwall.com/lists/oss-security/2024/02/13/1","tags":["x_transferred"]},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PNNHZSZPG2E7NBMBNYPGHCFI4V4XRWNQ/","tags":["x_transferred"]},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R/","tags":["x_transferred"]},{"url":"https://security.netapp.com/advisory/ntap-20240503-0008/","tags":["x_transferred"]}]}]}}