Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-3341: Vulnerability in ISC BIND 9

0
High
VulnerabilityCVE-2023-3341cvecve-2023-3341
Published: Wed Sep 20 2023 (09/20/2023, 12:32:03 UTC)
Source: CVE Database V5
Vendor/Project: ISC
Product: BIND 9

Description

The code that processes control channel messages sent to `named` calls certain functions recursively during packet parsing. Recursion depth is only limited by the maximum accepted packet size; depending on the environment, this may cause the packet-parsing code to run out of available stack memory, causing `named` to terminate unexpectedly. Since each incoming control channel message is fully parsed before its contents are authenticated, exploiting this flaw does not require the attacker to hold a valid RNDC key; only network access to the control channel's configured TCP port is necessary. This issue affects BIND 9 versions 9.2.0 through 9.16.43, 9.18.0 through 9.18.18, 9.19.0 through 9.19.16, 9.9.3-S1 through 9.16.43-S1, and 9.18.0-S1 through 9.18.18-S1.

AI-Powered Analysis

AILast updated: 12/02/2025, 20:21:56 UTC

Technical Analysis

CVE-2023-3341 is a vulnerability in ISC BIND 9, a widely used DNS server software, caused by recursive calls in the code that processes control channel messages sent to the 'named' daemon. During packet parsing, certain functions are called recursively without sufficient depth limitation other than the maximum accepted packet size. This can lead to stack exhaustion, causing the named process to terminate unexpectedly, resulting in a denial-of-service (DoS) condition. The vulnerability affects multiple BIND 9 versions, including 9.2.0 through 9.16.43, 9.18.0 through 9.18.18, 9.19.0 through 9.19.16, and their S1 variants. Notably, the control channel messages are fully parsed before authentication, meaning an attacker does not need a valid RNDC key to exploit this flaw; only network access to the control channel's TCP port is required. This significantly lowers the barrier to exploitation. The vulnerability is tracked under CWE-1325, which relates to improper resource management leading to stack exhaustion. The CVSS v3.1 score of 7.5 reflects a high severity, primarily due to the impact on availability (denial of service), with no impact on confidentiality or integrity. No public exploits have been reported yet, but the potential for disruption is significant given the critical role of DNS servers in network operations.

Potential Impact

For European organizations, the primary impact of CVE-2023-3341 is denial of service on DNS infrastructure, which can disrupt internal and external name resolution services. This can lead to widespread network outages, affecting web services, email, and other critical applications dependent on DNS. Organizations relying on BIND 9 for authoritative or recursive DNS services are particularly vulnerable. The lack of authentication requirement for exploitation increases the risk from internal and external attackers who can reach the control channel TCP port. Disruption of DNS services can have cascading effects on business operations, incident response, and customer trust. In sectors such as finance, telecommunications, and government, where DNS availability is critical, the impact could be severe. Additionally, the vulnerability could be leveraged as part of a larger attack campaign to degrade network infrastructure or as a distraction while other attacks are conducted.

Mitigation Recommendations

Organizations should immediately identify all BIND 9 instances and verify their versions against the affected list. Although no patch links are currently provided, monitoring ISC advisories for patches or updates is critical. In the interim, restrict network access to the control channel TCP port (typically 953) using firewall rules or network segmentation to limit exposure to trusted management hosts only. Disable or restrict RNDC control channel access where feasible. Implement robust monitoring and alerting for unexpected named process terminations or crashes to enable rapid incident response. Consider deploying redundant DNS servers or failover mechanisms to maintain DNS availability during potential outages. Conduct regular configuration reviews to ensure minimal exposure of control channels to untrusted networks. Finally, prepare for rapid deployment of patches once released by ISC and test updates in controlled environments before production rollout.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
isc
Date Reserved
2023-06-20T16:19:13.104Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 692f4a55c92f9eed9384cee0

Added to database: 12/2/2025, 8:21:41 PM

Last enriched: 12/2/2025, 8:21:56 PM

Last updated: 1/16/2026, 11:14:05 AM

Views: 65

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats