{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-20T14:17:35.853","vulnerabilities":[{"cve":{"id":"CVE-2023-4408","sourceIdentifier":"security-officer@isc.org","published":"2024-02-13T14:15:45.253","lastModified":"2025-03-14T17:15:40.310","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The DNS message parsing code in `named` includes a section whose computational complexity is overly high. It does not cause problems for typical DNS traffic, but crafted queries and responses may cause excessive CPU load on the affected `named` instance by exploiting this flaw. This issue affects both authoritative servers and recursive resolvers.\nThis issue affects BIND 9 versions 9.0.0 through 9.16.45, 9.18.0 through 9.18.21, 9.19.0 through 9.19.19, 9.9.3-S1 through 9.11.37-S1, 9.16.8-S1 through 9.16.45-S1, and 9.18.11-S1 through 9.18.21-S1."},{"lang":"es","value":"El código de análisis de mensajes DNS en \"named\" incluye una sección cuya complejidad computacional es demasiado alta. No causa problemas para el tráfico DNS típico, pero las consultas y respuestas manipuladas pueden causar una carga excesiva de la CPU en la instancia \"nombrada\" afectada al explotar esta falla. Este problema afecta tanto a los servidores autorizados como a los solucionadores recursivos. Este problema afecta a las versiones de BIND 9, 9.0.0 a 9.16.45, 9.18.0 a 9.18.21, 9.19.0 a 9.19.19, 9.9.3-S1 a 9.11.37-S1, 9.16.8-S1 a 9.16. 45-S1 y 9.18.11-S1 a 9.18.21-S1."}],"metrics":{"cvssMetricV31":[{"source":"security-officer@isc.org","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-407"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:netapp:ontap:9.14.1:*:*:*:*:*:*:*","matchCriteriaId":"B9840E9C-9BF2-45BA-BEAC-1091C6508358"},{"vulnerable":true,"criteria":"cpe:2.3:a:netapp:ontap:9.15.1:*:*:*:*:*:*:*","matchCriteriaId":"D1FA6FF1-FB7D-490A-AD03-646C267D46BA"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*","matchCriteriaId":"CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"},{"vulnerable":true,"criteria":"cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*","matchCriteriaId":"B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:isc:bind:*:*:*:*:-:*:*:*","versionStartIncluding":"9.0.0","versionEndIncluding":"9.16.45","matchCriteriaId":"0C8F8FB4-AED3-4FA9-B7C4-E9C22FB96C8E"},{"vulnerable":true,"criteria":"cpe:2.3:a:isc:bind:*:*:*:*:-:*:*:*","versionStartIncluding":"9.18.0","versionEndIncluding":"9.18.21","matchCriteriaId":"A1F6FD2C-94DA-4D48-BC8F-D1B118BC9629"},{"vulnerable":true,"criteria":"cpe:2.3:a:isc:bind:*:*:*:*:-:*:*:*","versionStartIncluding":"9.19.0","versionEndIncluding":"9.19.19","matchCriteriaId":"6D929353-790C-47DA-BB73-D94D403FA14D"},{"vulnerable":true,"criteria":"cpe:2.3:a:isc:bind:9.9.3:s1:*:*:supported_preview:*:*:*","matchCriteriaId":"40EE014B-0CD8-45F3-BEDB-AE6368A78B04"},{"vulnerable":true,"criteria":"cpe:2.3:a:isc:bind:9.16.8:s1:*:*:supported_preview:*:*:*","matchCriteriaId":"288EAD80-574B-4839-9C2C-81D6D088A733"},{"vulnerable":true,"criteria":"cpe:2.3:a:isc:bind:9.16.11:s1:*:*:supported_preview:*:*:*","matchCriteriaId":"3595F024-F910-4356-8B5B-D478960FF574"},{"vulnerable":true,"criteria":"cpe:2.3:a:isc:bind:9.16.12:s1:*:*:supported_preview:*:*:*","matchCriteriaId":"1B20F152-D0C3-4F07-83B3-5EA6B116F005"},{"vulnerable":true,"criteria":"cpe:2.3:a:isc:bind:9.16.13:s1:*:*:supported_preview:*:*:*","matchCriteriaId":"94661BA2-27F8-4FFE-B844-9404F735579D"},{"vulnerable":true,"criteria":"cpe:2.3:a:isc:bind:9.16.14:s1:*:*:supported_preview:*:*:*","matchCriteriaId":"53593603-E2AF-4925-A6E6-109F097A0FF2"},{"vulnerable":true,"criteria":"cpe:2.3:a:isc:bind:9.16.21:s1:*:*:supported_preview:*:*:*","matchCriteriaId":"751E37C2-8BFD-4306-95C1-8C01CE495FA4"},{"vulnerable":true,"criteria":"cpe:2.3:a:isc:bind:9.16.32:s1:*:*:supported_preview:*:*:*","matchCriteriaId":"CC432820-F1A2-4132-A673-2620119553C5"},{"vulnerable":true,"criteria":"cpe:2.3:a:isc:bind:9.16.36:s1:*:*:supported_preview:*:*:*","matchCriteriaId":"F70347F2-6750-4497-B8F4-2036F4F4443A"},{"vulnerable":true,"criteria":"cpe:2.3:a:isc:bind:9.16.43:s1:*:*:supported_preview:*:*:*","matchCriteriaId":"A4B53B73-DB81-4AC1-A4E6-89BB305D6514"},{"vulnerable":true,"criteria":"cpe:2.3:a:isc:bind:9.18.0:s1:*:*:supported_preview:*:*:*","matchCriteriaId":"22F7108A-73F1-4950-B2C8-AB56C1D4DAC5"},{"vulnerable":true,"criteria":"cpe:2.3:a:isc:bind:9.18.11:s1:*:*:supported_preview:*:*:*","matchCriteriaId":"16A7E0D1-35A1-4899-9FF2-14279C137C14"},{"vulnerable":true,"criteria":"cpe:2.3:a:isc:bind:9.18.18:s1:*:*:supported_preview:*:*:*","matchCriteriaId":"0233AEF2-9911-48AE-AE97-F217E3337AAF"}]}]}],"references":[{"url":"http://www.openwall.com/lists/oss-security/2024/02/13/1","source":"security-officer@isc.org","tags":["Mailing List","Third Party Advisory"]},{"url":"https://kb.isc.org/docs/cve-2023-4408","source":"security-officer@isc.org","tags":["Vendor Advisory"]},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HVRDSJVZKMCXKKPP6PNR62T7RWZ3YSDZ/","source":"security-officer@isc.org","tags":["Mailing List","Third Party Advisory"]},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PNNHZSZPG2E7NBMBNYPGHCFI4V4XRWNQ/","source":"security-officer@isc.org","tags":["Mailing List","Third Party Advisory"]},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGS7JN6FZXUSTC2XKQHH27574XOULYYJ/","source":"security-officer@isc.org","tags":["Mailing List","Third Party Advisory"]},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R/","source":"security-officer@isc.org","tags":["Mailing List","Third Party Advisory"]},{"url":"https://security.netapp.com/advisory/ntap-20240426-0001/","source":"security-officer@isc.org","tags":["Third Party Advisory"]},{"url":"http://www.openwall.com/lists/oss-security/2024/02/13/1","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"]},{"url":"https://kb.isc.org/docs/cve-2023-4408","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HVRDSJVZKMCXKKPP6PNR62T7RWZ3YSDZ/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"]},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PNNHZSZPG2E7NBMBNYPGHCFI4V4XRWNQ/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"]},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGS7JN6FZXUSTC2XKQHH27574XOULYYJ/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"]},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"]},{"url":"https://security.netapp.com/advisory/ntap-20240426-0001/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}