Skip to content

ISC Releases Security Advisories for Multiple Versions of BIND 9 - 20230627003

Overview

The Internet Systems Consortium (ISC) has released security advisories that address vulnerabilities affecting multiple versions of the ISC’s Berkeley Internet Name Domain (BIND) 9. A remote attacker could exploit these vulnerabilities to potentially cause denial-of-service conditions.

What is the vulnerability?

CVE-2023-2828 - CVSS v3 Base Score: 7.5\ CVE-2023-2829 - CVSS v3 Base Score: 7.5\ CVE-2023-2911 - CVSS v3 Base Score: 7.5

What is vulnerable?

The vulnerability affects the following products:

BIND

  • 9.11.0 -> 9.16.41
  • 9.18.0 -> 9.18.15
  • 9.19.0 -> 9.19.13

BIND Supported Preview Edition

  • 9.11.3-S1 -> 9.16.41-S1
  • 9.18.11-S1 -> 9.18.15-S1

What has been observed?

There is no evidence of exploitation affecting Western Australian Government networks at the time of publishing.

Recommendation

The WA SOC recommends administrators apply the solutions as per vendor instructions to all affected devices within expected timeframe of one month (refer Patch Management):

Additional References