First published: Thu May 19 2022(Updated: )
On vulnerable configurations, the named daemon may, in some circumstances, terminate with an assertion failure. Vulnerable configurations are those that include a reference to http within the listen-on statements in their named.conf. TLS is used by both DNS over TLS (DoT) and DNS over HTTPS (DoH), but configurations using DoT alone are unaffected. Affects BIND 9.18.0 -> 9.18.2 and version 9.19.0 of the BIND 9.19 development branch.
Credit: security-officer@isc.org
Affected Software | Affected Version | How to fix |
---|---|---|
ISC BIND | >=9.18.0<=9.18.2 | |
ISC BIND | =9.19.0 | |
netapp h410c firmware | ||
netapp h410c | ||
netapp h300s firmware | ||
netapp h300s | ||
NetApp H500S Firmware | ||
netapp h500s | ||
netapp h700s firmware | ||
netapp h700s | ||
netapp h410s firmware | ||
netapp h410s |
Upgrade to the patched release most closely related to your current version of BIND: BIND 9.18.3 or BIND 9.19.1.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-1183 is a vulnerability that can cause the named daemon to terminate with an assertion failure under certain configurations.
Vulnerable configurations include the ISC BIND software versions 9.18.0 to 9.18.2, as well as version 9.19.0. Netapp H410c Firmware is also affected.
The severity of CVE-2022-1183 is considered high with a severity value of 7.5.
To fix CVE-2022-1183, update to a non-vulnerable version of ISC BIND or apply the recommended security patches provided by Netapp H410c Firmware.
You can find more information about CVE-2022-1183 in the references: [ISC Knowledge Base](https://kb.isc.org/docs/cve-2022-1183) and [Netapp Security Advisory](https://security.netapp.com/advisory/ntap-20220707-0002/).