[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249982

 
 

909

 
 

195748

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS2-2023-2001 --- bind

ID: oval:org.secpod.oval:def:1701241Date: (C)2023-03-28   (M)2024-01-23
Class: PATCHFamily: unix




A cache poisoning vulnerability was found in BIND when using forwarders. Bogus NS records supplied by the forwarders may be cached and used by name if it needs to recurse for any reason. This issue causes it to obtain and pass on potentially incorrect answers. This flaw allows a remote attacker to manipulate cache results with incorrect records, leading to queries made to the wrong servers, possibly resulting in false information received on the client's end. By flooding the target resolver with queries exploiting this flaw an attacker can significantly impair the resolver's performance, effectively denying legitimate clients access to the DNS resolution service. By spoofing the target resolver with responses that have a malformed ECDSA signature, an attacker can trigger a small memory leak. It is possible to gradually erode available memory to the point where named crashes for lack of resources. By spoofing the target resolver with responses that have a malformed EdDSA signature, an attacker can trigger a small memory leak. It is possible to gradually erode available memory to the point where named crashes for lack of resources

Platform:
Amazon Linux 2
Product:
bind
Reference:
ALAS2-2023-2001
CVE-2021-25220
CVE-2022-2795
CVE-2022-38177
CVE-2022-38178
CVE    4
CVE-2021-25220
CVE-2022-2795
CVE-2022-38178
CVE-2022-38177
...
CPE    9
cpe:/a:isc:bind:9.11.29:s1:~~supported_preview~~~
cpe:/a:isc:bind
cpe:/a:isc:bind:9.11.8:s1:~~supported_preview~~~
cpe:/a:isc:bind:9.9.3:s1:~~supported_preview~~~
...

© SecPod Technologies