First published: Tue Dec 27 2022(Updated: )
DNSSEC validation is not performed correctly. An attacker can cause this package to report successful validation for invalid, attacker-controlled records. The owner name of RRSIG RRs is not validated, permitting an attacker to present the RRSIG for an attacker-controlled domain in a response for any other domain.
Credit: security@golang.org
Affected Software | Affected Version | How to fix |
---|---|---|
go/github.com/peterzen/goresolver | <=1.0.2 | |
Go-resolver |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-3346 has been categorized as a critical severity vulnerability.
To fix CVE-2022-3346, upgrade the goresolver package to a version beyond 1.0.2 that addresses this validation issue.
CVE-2022-3346 allows attackers to exploit improper DNSSEC validation, potentially resulting in successful validation of malicious records.
CVE-2022-3346 affects the goresolver package versions up to and including 1.0.2.
Yes, CVE-2022-3346 can enable DNS spoofing attacks by misleading the resolver into accepting fraudulent DNS responses.