Thursday, April 18, 2024

BIND DNS Software High-Severity Flaws Let Hackers Remotely Trigger the Attack

The ISC (Internet Systems Consortium) released a security patch this week in an attempt to address six vulnerabilities that could allow remote attackers to take control of BIND DNS servers.

In total, four of the six vulnerabilities were rated as ‘high severity’ due to their denial of service (DoS) nature.


Here below we have mentioned all the high severity vulnerabilities:-

CVE-2022-2906, the first of these, is a memory leak vulnerability, which has been reported in multiple places. With OpenSSL 3.0.0 and later versions, this vulnerability using TKEY records primarily affects the key processing in Diffie-Hellman mode.

There was also a memory leak in the code for DNSSEC verification in the ECDSA DNSSEC authentication system, which was tracked as CVE-2022-38177. By mismatching a signature length, an attacker may be able to exploit the vulnerability.

An attacker can trigger a small memory leak by spoofing the target resolver to cause responses to be returned with an ECDSA signature that has been tampered with. If you gradually erode the amount of memory available to a named until a point when there is not enough memory there is a chance of named crashing.

Under particular conditions, when specially crafted queries are sent to the BIND 9 resolver, a third issue tracked as CVE-2022-3080 may lead to the resolver crashing as it is unable to resolve the query.

It has been identified that the ECDSA DNSSEC verification code contains a memory leak, which is tracked as CVE-2022-38178, and it’s the fourth high severity vulnerability.


It has been announced that updates have been released for the following:-

  • BIND 9.18 (stable branch)
  • BIND 9.19 (development version)
  • BIND 9.16 (Extended Support Version)

Moreover, all these vulnerabilities were not exploited in the wild nor any exploits are available publicly.

ISC has recently issued an advisory on these four security vulnerabilities. CISA has also called on users and administrators to review the advisory as soon as possible in order to fix these holes.

Download Free SWG – Secure Web Filtering – E-book


Latest articles

Xiid SealedTunnel: Unfazed by Yet Another Critical Firewall Vulnerability (CVE-2024-3400)

In the wake of the recent disclosure of a critical vulnerability (CVE-2024-3400) affecting a...

Cerber Linux Ransomware Exploits Atlassian Servers to Take Full Control

Security researchers at Cado Security Labs have uncovered a new variant of the Cerber...

FGVulDet – New Vulnerability Detector to Analyze Source Code

Detecting source code vulnerabilities aims to protect software systems from attacks by identifying inherent...

North Korean Hackers Abuse DMARC To Legitimize Their Emails

DMARC is targeted by hackers as this serves to act as a preventative measure...

L00KUPRU Ransomware Attackers discovered in the wild

A new variant of the Xorist ransomware, dubbed L00KUPRU, has been discovered in the...

Oracle Releases Biggest Security Update in 2024 – 372 Vulnerabilities Are Fixed – Update Now!

Oracle has released its April 2024 Critical Patch Update (CPU), addressing 372 security vulnerabilities...

Outlook Login Panel Themed Phishing Attack Evaded All Antivirus Detections

Cybersecurity researchers have uncovered a new phishing attack that has bypassed all antivirus detections.The...
Guru baran
Guru baran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.


Mastering WAAP/WAF ROI Analysis

As the importance of compliance and safeguarding critical websites and APIs grows, Web Application and API Protection (WAAP) solutions play an integral role.
Key takeaways include:

  • Pricing models
  • Cost Estimation
  • ROI Calculation

Related Articles