First published: Tue Dec 27 2022(Updated: )
DNSSEC validation is not performed correctly. An attacker can cause this package to report successful validation for invalid, attacker-controlled records. Root DNSSEC public keys are not validated, permitting an attacker to present a self-signed root key and delegation chain.
Credit: security@golang.org
Affected Software | Affected Version | How to fix |
---|---|---|
go/github.com/peterzen/goresolver | <=1.0.2 | |
Go-resolver |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-3347 has a medium severity rating due to its potential to allow attackers to manipulate DNSSEC validation.
To fix CVE-2022-3347, update the goresolver package to version 1.0.3 or later where the vulnerability has been addressed.
CVE-2022-3347 can allow attackers to present false validation responses, compromising the integrity of DNS queries.
CVE-2022-3347 affects versions of the goresolver package up to and including version 1.0.2.
Yes, CVE-2022-3347 is a recognized vulnerability documented in security advisories and issue trackers.