First published: Fri Nov 18 2022(Updated: )
An issue was discovered in MaraDNS Deadwood through 3.5.0021 that allows variant V1 of unintended domain name resolution. A revoked domain name can still be resolvable for a long time, including expired domains and taken-down malicious domains. The effects of an exploit would be widespread and highly impactful, because the exploitation conforms to de facto DNS specifications and operational practices, and overcomes current mitigation patches for "Ghost" domain names.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ubuntu/maradns | <2.0.13-1.4+ | 2.0.13-1.4+ |
ubuntu/maradns | <2.0.13-1.4+ | 2.0.13-1.4+ |
ubuntu/maradns | <2.0.13-1ubuntu0.1~ | 2.0.13-1ubuntu0.1~ |
ubuntu/maradns | <2.0.13-1.2ubuntu0.1~ | 2.0.13-1.2ubuntu0.1~ |
ubuntu/maradns | <2.0.13-1.4+ | 2.0.13-1.4+ |
debian/maradns | <=2.0.13-1.2 | 2.0.13-1.2+deb10u1 2.0.13-1.4+deb11u1 2.0.13-1.6 |
MaraDNS | <3.4.03 | |
MaraDNS | >=3.5.0<3.5.0022 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-30256 is considered high severity due to its potential for widespread exploitation affecting domain name resolution.
CVE-2022-30256 affects MaraDNS versions prior to 3.5.0022, specifically those below 3.5.0 and within certain Ubuntu and Debian releases.
To fix CVE-2022-30256, upgrade MaraDNS to version 2.0.13-1.4+ or later for the affected Ubuntu and Debian distributions.
CVE-2022-30256 is a domain name resolution vulnerability that allows the resolution of revoked domain names.
Users and systems utilizing vulnerable versions of MaraDNS, especially on supported Ubuntu and Debian systems, are impacted by CVE-2022-30256.