BIND DNS Software High-Severity Flaws Let Hackers Remotely Trigger the Attack

The ISC (Internet Systems Consortium) released a security patch this week in an attempt to address six vulnerabilities that could allow remote attackers to take control of BIND DNS servers.

In total, four of the six vulnerabilities were rated as ‘high severity’ due to their denial of service (DoS) nature.

Vulnerabilities

Here below we have mentioned all the high severity vulnerabilities:-

CVE-2022-2906, the first of these, is a memory leak vulnerability, which has been reported in multiple places. With OpenSSL 3.0.0 and later versions, this vulnerability using TKEY records primarily affects the key processing in Diffie-Hellman mode.

There was also a memory leak in the code for DNSSEC verification in the ECDSA DNSSEC authentication system, which was tracked as CVE-2022-38177. By mismatching a signature length, an attacker may be able to exploit the vulnerability.

An attacker can trigger a small memory leak by spoofing the target resolver to cause responses to be returned with an ECDSA signature that has been tampered with. If you gradually erode the amount of memory available to a named until a point when there is not enough memory there is a chance of named crashing.

Under particular conditions, when specially crafted queries are sent to the BIND 9 resolver, a third issue tracked as CVE-2022-3080 may lead to the resolver crashing as it is unable to resolve the query.

It has been identified that the ECDSA DNSSEC verification code contains a memory leak, which is tracked as CVE-2022-38178, and it’s the fourth high severity vulnerability.

Updates

It has been announced that updates have been released for the following:-

  • BIND 9.18 (stable branch)
  • BIND 9.19 (development version)
  • BIND 9.16 (Extended Support Version)

Moreover, all these vulnerabilities were not exploited in the wild nor any exploits are available publicly.

ISC has recently issued an advisory on these four security vulnerabilities. CISA has also called on users and administrators to review the advisory as soon as possible in order to fix these holes.

Download Free SWG – Secure Web Filtering – E-book

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

GitLab Patches HTML Injection Flaw Leads to XSS Attacks

GitLab has announced the release of critical security updates for its Community Edition (CE) and…

7 mins ago

Xerox Printers Vulnerable to Remote Code Execution Attacks

Multiple Xerox printer models, including EC80xx, AltaLink, VersaLink, and WorkCentre, have been identified as vulnerable…

2 hours ago

Cisco ASA Devices Vulnerable to SSH Remote Command Injection Flaw

Cisco has issued a critical security advisory regarding a vulnerability in its Adaptive Security Appliance…

3 hours ago

Google Patches Multiple Chrome Security Vulnerabilities

Google has released several security patches for its Chrome browser, addressing critical vulnerabilities that malicious…

4 hours ago

Grayscale Investments Data Breach Exposes 693K User Records Reportedly Affected

Grayscale Investments, a prominent crypto asset manager, has reportedly suffered a data breach affecting 693,635…

24 hours ago

Threat Actors Allegedly Selling Database of 1,000 NHS Email Accounts

A database containing over 1,000 email accounts associated with the National Health Service (NHS) has…

1 day ago