CVE-2023-4408

Updated: 2025-12-14 03:16:17.303

Description:

The DNS message parsing code in `named` includes a section whose computational complexity is overly high. It does not cause problems for typical DNS traffic, but crafted queries and responses may cause excessive CPU load on the affected `named` instance by exploiting this flaw. This issue affects both authoritative servers and recursive resolvers. This issue affects BIND 9 versions 9.0.0 through 9.16.45, 9.18.0 through 9.18.21, 9.19.0 through 9.19.19, 9.9.3-S1 through 9.11.37-S1, 9.16.8-S1 through 9.16.45-S1, and 9.18.11-S1 through 9.18.21-S1.


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x NONE 0.0
CVSS Version 3.x HIGH 7.5

Status

OS name Project name Version Score Severity Status Errata Last updated

Statement

Oracle Linux 7 ELS bind 9.11.4 7.5 HIGH Already Fixed 2026-01-20 01:23:24
Oracle Linux 7 ELS dhcp 4.2.5 7.5 HIGH Not Vulnerable 2026-01-20 01:23:23
Ubuntu 16.04 ELS bind9 9.10.3 7.5 HIGH Ignored 2024-11-14 12:13:40 We have reasoned not to port the patches for this CVE since the changes introduced are too intrusive
Ubuntu 16.04 ELS dhcp 4.3.3 7.5 HIGH Not Vulnerable 2024-10-09 14:26:48 We have reasoned not to port the patches for this CVE since the changes introduced are too intrusive
Ubuntu 18.04 ELS bind9 9.11.3 7.5 HIGH Released CLSA-2024:1731345748 2024-11-11 13:32:44 We have reasoned not to port the patches for this CVE since the changes introduced are too intrusive
Ubuntu 18.04 ELS dhcp 4.3.5 7.5 HIGH Not Vulnerable 2024-10-02 14:26:02 We have reasoned not to port the patches for this CVE since the changes introduced are too intrusive
Total: 26