First published: Wed Sep 21 2022(Updated: )
By sending specific queries to the resolver, an attacker can cause named to crash.
Credit: security-officer@isc.org security-officer@isc.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/bind9.16 | <32:9.16.23-0.7.el8_6.1 | 32:9.16.23-0.7.el8_6.1 |
redhat/bind | <32:9.16.23-1.el9_0.1 | 32:9.16.23-1.el9_0.1 |
ISC BIND | >=9.16.14<9.16.33 | |
ISC BIND | >=9.18.0<9.18.7 | |
ISC BIND | >=9.19.0<9.19.5 | |
ISC BIND | =9.16.14-s1 | |
ISC BIND | =9.16.21-s1 | |
ISC BIND | =9.16.32-s1 | |
Fedoraproject Fedora | =35 | |
Fedoraproject Fedora | =36 | |
Fedoraproject Fedora | =37 | |
debian/bind9 | 1:9.11.5.P4+dfsg-5.1+deb10u7 1:9.11.5.P4+dfsg-5.1+deb10u9 1:9.16.44-1~deb11u1 1:9.18.19-1~deb12u1 1:9.19.17-1 | |
redhat/bind | <9.16.33 | 9.16.33 |
redhat/bind | <9.18.7 | 9.18.7 |
redhat/bind | <9.19.5 | 9.19.5 |
>=9.16.14<9.16.33 | ||
>=9.18.0<9.18.7 | ||
>=9.19.0<9.19.5 | ||
=9.16.14-s1 | ||
=9.16.21-s1 | ||
=9.16.32-s1 | ||
=35 | ||
=36 | ||
=37 |
Upgrade to the patched release most closely related to your current version of BIND: BIND 9.16.33, BIND 9.18.7, BIND 9.19.5, or for BIND Supported Preview Edition (a special feature preview branch of BIND provided to eligible ISC support customers): BIND 9.16.33-S1.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this flaw is CVE-2022-3080.
The impact of this vulnerability is that an attacker can cause named to crash.
The Bind package versions 9.16.33, 9.18.7, and 9.19.5, as well as specific versions of bind9 and ISC BIND, and Fedora versions 35, 36, and 37 are affected.
To fix this vulnerability, update to Bind package version 9.16.33, 9.18.7, or 9.19.5, depending on your distribution and package source.
The severity level of this vulnerability is high, with a CVSS score of 7.5.