Tuesday, November 26, 2024
HomeCVE/vulnerabilityBIND DNS Software High-Severity Flaws Let Hackers Remotely Trigger the Attack

BIND DNS Software High-Severity Flaws Let Hackers Remotely Trigger the Attack

Published on

The ISC (Internet Systems Consortium) released a security patch this week in an attempt to address six vulnerabilities that could allow remote attackers to take control of BIND DNS servers.

In total, four of the six vulnerabilities were rated as ‘high severity’ due to their denial of service (DoS) nature.

Vulnerabilities

Here below we have mentioned all the high severity vulnerabilities:-

- Advertisement - SIEM as a Service

CVE-2022-2906, the first of these, is a memory leak vulnerability, which has been reported in multiple places. With OpenSSL 3.0.0 and later versions, this vulnerability using TKEY records primarily affects the key processing in Diffie-Hellman mode.

There was also a memory leak in the code for DNSSEC verification in the ECDSA DNSSEC authentication system, which was tracked as CVE-2022-38177. By mismatching a signature length, an attacker may be able to exploit the vulnerability.

An attacker can trigger a small memory leak by spoofing the target resolver to cause responses to be returned with an ECDSA signature that has been tampered with. If you gradually erode the amount of memory available to a named until a point when there is not enough memory there is a chance of named crashing.

Under particular conditions, when specially crafted queries are sent to the BIND 9 resolver, a third issue tracked as CVE-2022-3080 may lead to the resolver crashing as it is unable to resolve the query.

It has been identified that the ECDSA DNSSEC verification code contains a memory leak, which is tracked as CVE-2022-38178, and it’s the fourth high severity vulnerability.

Updates

It has been announced that updates have been released for the following:-

  • BIND 9.18 (stable branch)
  • BIND 9.19 (development version)
  • BIND 9.16 (Extended Support Version)

Moreover, all these vulnerabilities were not exploited in the wild nor any exploits are available publicly.

ISC has recently issued an advisory on these four security vulnerabilities. CISA has also called on users and administrators to review the advisory as soon as possible in order to fix these holes.

Download Free SWG – Secure Web Filtering – E-book

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Researchers Detailed Tools Used By Hacktivists Fueling Ransomware Attacks

CyberVolk, a politically motivated hacktivist group, has leveraged readily available ransomware builders like AzzaSec,...

Blue Yonder Ransomware Attack Impacts Starbucks & Multiple Supermarkets

A ransomware attack on Blue Yonder, a leading supply chain management software provider, has...

Dell Wyse Management Suite Vulnerabilities Let Attackers Exploit Affected Systems Remotely

Dell Technologies has released a security update for its Wyse Management Suite (WMS) to...

CISA Details Red Team Assessment Including TTPs & Network Defense

The Cybersecurity and Infrastructure Security Agency (CISA) recently detailed findings from a Red Team...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Dell Wyse Management Suite Vulnerabilities Let Attackers Exploit Affected Systems Remotely

Dell Technologies has released a security update for its Wyse Management Suite (WMS) to...

IBM Workload Scheduler Vulnerability Stores User Credentials in Plain Text

IBM has issued a security bulletin warning customers about a vulnerability in its Workload...

Multiple Flaws With Android & Google Pixel Devices Let Attackers Elevate Privileges

Several high-severity vulnerabilities have been identified in Android and Google Pixel devices, exposing millions...