{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-20T23:36:12.835","vulnerabilities":[{"cve":{"id":"CVE-2023-5517","sourceIdentifier":"security-officer@isc.org","published":"2024-02-13T14:15:45.510","lastModified":"2024-11-21T08:41:55.487","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A flaw in query-handling code can cause `named` to exit prematurely with an assertion failure when:\n\n  - `nxdomain-redirect <domain>;` is configured, and\n  - the resolver receives a PTR query for an RFC 1918 address that would normally result in an authoritative NXDOMAIN response.\nThis issue affects BIND 9 versions 9.12.0 through 9.16.45, 9.18.0 through 9.18.21, 9.19.0 through 9.19.19, 9.16.8-S1 through 9.16.45-S1, and 9.18.11-S1 through 9.18.21-S1."},{"lang":"es","value":"Una falla en el código de manejo de consultas puede causar que `named` se cierre prematuramente con un error de aserción cuando: - `nxdomain-redirect ;` está configurado, y - el solucionador recibe una consulta PTR para una dirección RFC 1918 que normalmente dar como resultado una respuesta NXDOMAIN autorizada. Este problema afecta a las versiones de BIND 9, 9.12.0 a 9.16.45, 9.18.0 a 9.18.21, 9.19.0 a 9.19.19, 9.16.8-S1 a 9.16.45-S1 y 9.18.11-S1 a 9.18. .21-S1."}],"metrics":{"cvssMetricV31":[{"source":"security-officer@isc.org","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-617"}]},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-617"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*","matchCriteriaId":"3A756737-1CC4-42C2-A4DF-E1C893B4E2D5"},{"vulnerable":true,"criteria":"cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*","matchCriteriaId":"CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"},{"vulnerable":true,"criteria":"cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*","matchCriteriaId":"B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:isc:bind:*:*:*:*:-:*:*:*","versionStartIncluding":"9.12.0","versionEndIncluding":"9.16.45","matchCriteriaId":"D4DCB2AB-E5FC-419F-B928-293EA038E376"},{"vulnerable":true,"criteria":"cpe:2.3:a:isc:bind:*:*:*:*:-:*:*:*","versionStartIncluding":"9.18.0","versionEndIncluding":"9.18.21","matchCriteriaId":"A1F6FD2C-94DA-4D48-BC8F-D1B118BC9629"},{"vulnerable":true,"criteria":"cpe:2.3:a:isc:bind:*:*:*:*:-:*:*:*","versionStartIncluding":"9.19.0","versionEndIncluding":"9.19.19","matchCriteriaId":"6D929353-790C-47DA-BB73-D94D403FA14D"},{"vulnerable":true,"criteria":"cpe:2.3:a:isc:bind:9.16.8:s1:*:*:supported_preview:*:*:*","matchCriteriaId":"288EAD80-574B-4839-9C2C-81D6D088A733"},{"vulnerable":true,"criteria":"cpe:2.3:a:isc:bind:9.16.11:s1:*:*:supported_preview:*:*:*","matchCriteriaId":"3595F024-F910-4356-8B5B-D478960FF574"},{"vulnerable":true,"criteria":"cpe:2.3:a:isc:bind:9.16.12:s1:*:*:supported_preview:*:*:*","matchCriteriaId":"1B20F152-D0C3-4F07-83B3-5EA6B116F005"},{"vulnerable":true,"criteria":"cpe:2.3:a:isc:bind:9.16.13:s1:*:*:supported_preview:*:*:*","matchCriteriaId":"94661BA2-27F8-4FFE-B844-9404F735579D"},{"vulnerable":true,"criteria":"cpe:2.3:a:isc:bind:9.16.14:s1:*:*:supported_preview:*:*:*","matchCriteriaId":"53593603-E2AF-4925-A6E6-109F097A0FF2"},{"vulnerable":true,"criteria":"cpe:2.3:a:isc:bind:9.16.21:s1:*:*:supported_preview:*:*:*","matchCriteriaId":"751E37C2-8BFD-4306-95C1-8C01CE495FA4"},{"vulnerable":true,"criteria":"cpe:2.3:a:isc:bind:9.16.32:s1:*:*:supported_preview:*:*:*","matchCriteriaId":"CC432820-F1A2-4132-A673-2620119553C5"},{"vulnerable":true,"criteria":"cpe:2.3:a:isc:bind:9.16.36:s1:*:*:supported_preview:*:*:*","matchCriteriaId":"F70347F2-6750-4497-B8F4-2036F4F4443A"},{"vulnerable":true,"criteria":"cpe:2.3:a:isc:bind:9.16.43:s1:*:*:supported_preview:*:*:*","matchCriteriaId":"A4B53B73-DB81-4AC1-A4E6-89BB305D6514"},{"vulnerable":true,"criteria":"cpe:2.3:a:isc:bind:9.16.45:s1:*:*:supported_preview:*:*:*","matchCriteriaId":"EC7357C9-AD62-4B7E-B013-780108BA562E"},{"vulnerable":true,"criteria":"cpe:2.3:a:isc:bind:9.18.11:s1:*:*:supported_preview:*:*:*","matchCriteriaId":"16A7E0D1-35A1-4899-9FF2-14279C137C14"},{"vulnerable":true,"criteria":"cpe:2.3:a:isc:bind:9.18.18:s1:*:*:supported_preview:*:*:*","matchCriteriaId":"0233AEF2-9911-48AE-AE97-F217E3337AAF"},{"vulnerable":true,"criteria":"cpe:2.3:a:isc:bind:9.18.21:s1:*:*:supported_preview:*:*:*","matchCriteriaId":"DFE3AE03-DBB5-4891-8EF2-BF30AA6F66FD"}]}]}],"references":[{"url":"http://www.openwall.com/lists/oss-security/2024/02/13/1","source":"security-officer@isc.org","tags":["Mailing List","Third Party Advisory"]},{"url":"https://kb.isc.org/docs/cve-2023-5517","source":"security-officer@isc.org","tags":["Vendor Advisory"]},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HVRDSJVZKMCXKKPP6PNR62T7RWZ3YSDZ/","source":"security-officer@isc.org","tags":["Mailing List","Third Party Advisory"]},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PNNHZSZPG2E7NBMBNYPGHCFI4V4XRWNQ/","source":"security-officer@isc.org","tags":["Mailing List","Third Party Advisory"]},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGS7JN6FZXUSTC2XKQHH27574XOULYYJ/","source":"security-officer@isc.org","tags":["Mailing List","Third Party Advisory"]},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R/","source":"security-officer@isc.org","tags":["Mailing List","Third Party Advisory"]},{"url":"https://security.netapp.com/advisory/ntap-20240503-0006/","source":"security-officer@isc.org","tags":["Third Party Advisory"]},{"url":"http://www.openwall.com/lists/oss-security/2024/02/13/1","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"]},{"url":"https://kb.isc.org/docs/cve-2023-5517","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HVRDSJVZKMCXKKPP6PNR62T7RWZ3YSDZ/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"]},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PNNHZSZPG2E7NBMBNYPGHCFI4V4XRWNQ/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"]},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGS7JN6FZXUSTC2XKQHH27574XOULYYJ/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"]},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"]},{"url":"https://security.netapp.com/advisory/ntap-20240503-0006/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}