CVE-2023-5517

Source
https://cve.org/CVERecord?id=CVE-2023-5517
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-5517.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-5517
Downstream
Related
Published
2024-02-13T14:15:45.510Z
Modified
2026-04-16T00:07:16.136585511Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

A flaw in query-handling code can cause named to exit prematurely with an assertion failure when:

  • nxdomain-redirect <domain>; is configured, and
  • the resolver receives a PTR query for an RFC 1918 address that would normally result in an authoritative NXDOMAIN response. This issue affects BIND 9 versions 9.12.0 through 9.16.45, 9.18.0 through 9.18.21, 9.19.0 through 9.19.19, 9.16.8-S1 through 9.16.45-S1, and 9.18.11-S1 through 9.18.21-S1.
Database specific
{
    "unresolved_ranges": [
        {
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "9.16.11-s1"
                }
            ],
            "cpe": "cpe:2.3:a:isc:bind:9.16.11:s1:*:*:supported_preview:*:*:*"
        },
        {
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "9.16.12-s1"
                }
            ],
            "cpe": "cpe:2.3:a:isc:bind:9.16.12:s1:*:*:supported_preview:*:*:*"
        },
        {
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "9.16.13-s1"
                }
            ],
            "cpe": "cpe:2.3:a:isc:bind:9.16.13:s1:*:*:supported_preview:*:*:*"
        },
        {
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "9.16.14-s1"
                }
            ],
            "cpe": "cpe:2.3:a:isc:bind:9.16.14:s1:*:*:supported_preview:*:*:*"
        },
        {
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "9.16.21-s1"
                }
            ],
            "cpe": "cpe:2.3:a:isc:bind:9.16.21:s1:*:*:supported_preview:*:*:*"
        },
        {
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "9.16.32-s1"
                }
            ],
            "cpe": "cpe:2.3:a:isc:bind:9.16.32:s1:*:*:supported_preview:*:*:*"
        },
        {
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "9.16.36-s1"
                }
            ],
            "cpe": "cpe:2.3:a:isc:bind:9.16.36:s1:*:*:supported_preview:*:*:*"
        },
        {
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "9.16.43-s1"
                }
            ],
            "cpe": "cpe:2.3:a:isc:bind:9.16.43:s1:*:*:supported_preview:*:*:*"
        },
        {
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "9.16.45-s1"
                }
            ],
            "cpe": "cpe:2.3:a:isc:bind:9.16.45:s1:*:*:supported_preview:*:*:*"
        },
        {
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "9.16.8-s1"
                }
            ],
            "cpe": "cpe:2.3:a:isc:bind:9.16.8:s1:*:*:supported_preview:*:*:*"
        },
        {
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "9.18.11-s1"
                }
            ],
            "cpe": "cpe:2.3:a:isc:bind:9.18.11:s1:*:*:supported_preview:*:*:*"
        },
        {
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "9.18.18-s1"
                }
            ],
            "cpe": "cpe:2.3:a:isc:bind:9.18.18:s1:*:*:supported_preview:*:*:*"
        },
        {
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "9.18.21-s1"
                }
            ],
            "cpe": "cpe:2.3:a:isc:bind:9.18.21:s1:*:*:supported_preview:*:*:*"
        },
        {
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "38"
                }
            ],
            "cpe": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*"
        },
        {
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "39"
                }
            ],
            "cpe": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*"
        }
    ]
}
References

Affected packages

Git / gitlab.isc.org/isc-projects/bind9

Affected ranges

Type
GIT
Repo
https://gitlab.isc.org/isc-projects/bind9
Events
Database specific
{
    "source": "CPE_FIELD",
    "extracted_events": [
        {
            "introduced": "9.12.0"
        },
        {
            "last_affected": "9.16.45"
        },
        {
            "introduced": "9.18.0"
        },
        {
            "last_affected": "9.18.21"
        },
        {
            "introduced": "9.19.0"
        },
        {
            "last_affected": "9.19.19"
        }
    ],
    "cpe": "cpe:2.3:a:isc:bind:*:*:*:*:-:*:*:*"
}

Affected versions

v9.*
v9.18.0
v9.18.21
v9.19.0
v9.19.19

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-5517.json"