NA

CVE-2022-3080

Published: 21/09/2022 Updated: 07/11/2023
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 0

Vulnerability Summary

It exists that Bind incorrectly handled memory when processing certain Diffie-Hellman key exchanges. A remote attacker could use this issue to consume resources, leading to a denial of service. This issue only affected Ubuntu 22.04 LTS. (CVE-2022-2906)

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

isc bind 9.16.21

isc bind

isc bind 9.16.32

isc bind 9.16.14

fedoraproject fedora 35

fedoraproject fedora 36

fedoraproject fedora 37

Vendor Advisories

Synopsis Important: bind security update Type/Severity Security Advisory: Important Red Hat Insights patch analysis Identify and remediate systems affected by this advisory View affected systems Topic An update for bind is now available for Red Hat Enterprise Linux 9Red Hat Product Security has rated this update as having a securi ...
Several security issues were fixed in Bind ...
Several vulnerabilities were discovered in BIND, a DNS server implementation CVE-2022-2795 Yehuda Afek, Anat Bremler-Barr and Shani Stajnrod discovered that a flaw in the resolver code can cause named to spend excessive amounts of time on processing large delegations, significantly degrade resolver performance and result in denial ...
Description<!----> A flaw was found in the Bind package, where the resolver can crash when stale cache and stale answers are enabled, option stale-answer-client-timeout is set to 0 and there is a stale CNAME in the cache for an incoming query By sending specific queries to the resolver, an attacker can cause named to crash A flaw wa ...
Severity Unknown Remote Unknown Type Unknown Description AVG-2811 bind 9186-1 9187-1 Unknown Fixed ...