[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249966

 
 

909

 
 

195636

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS2023-2023-010 --- bind

ID: oval:org.secpod.oval:def:19500084Date: (C)2023-06-12   (M)2024-01-23
Class: PATCHFamily: unix




A cache poisoning vulnerability was found in BIND when using forwarders. Bogus NS records supplied by the forwarders may be cached and used by name if it needs to recurse for any reason. This issue causes it to obtain and pass on potentially incorrect answers. This flaw allows a remote attacker to manipulate cache results with incorrect records, leading to queries made to the wrong servers, possibly resulting in false information received on the client's end. A flaw was found in Bind that incorrectly handles certain crafted TCP streams. The vulnerability allows TCP connection slots to be consumed for an indefinite time frame via a specifically crafted TCP stream sent from a client. This flaw allows a remote attacker to send specially crafted TCP streams with keep-response-order enabled that could cause connections to BIND to remain in CLOSE_WAIT status for an indefinite period, even after the client has terminated the connection. This issue results in BIND consuming resources, leading to a denial of service

Platform:
Amazon Linux 2023
Product:
bind
python3-bind
Reference:
ALAS2023-2023-010
CVE-2021-25220
CVE-2022-0396
CVE    2
CVE-2022-0396
CVE-2021-25220
CPE    2
cpe:/a:isc:bind
cpe:/a:python:python3-bind

© SecPod Technologies