Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.113848
Categoría:Denial of Service
Título:ISC BIND DoS Vulnerability (CVE-2022-0396) - Linux
Resumen:ISC BIND is prone to a denial of service (DoS) vulnerability.
Descripción:Summary:
ISC BIND is prone to a denial of service (DoS) vulnerability.

Vulnerability Insight:
ISC recently discovered an issue in BIND that allows TCP
connection slots to be consumed for an indefinite time frame via a specifically crafted TCP stream
sent from a client. This issue is present in BIND 9.16.11 to 9.16.26 (including S editions), and
9.18.0.

This issue can only be triggered on BIND servers which have keep-response-order enabled, which is
not the default configuration. The keep-response-order option is an ACL block, any hosts which are
specified within it will be able to trigger this issue on affected versions.

Vulnerability Impact:
Specifically crafted TCP streams can cause connections to BIND to
remain in CLOSE_WAIT status for an indefinite period of time, even after the client has terminated
the connection.

Affected Software/OS:
ISC BIND versions 9.16.11 through 9.16.26, 9.17.0 through
9.18.0 and 9.16.11-S1 through 9.16.26-S1.

Solution:
Update to version 9.16.27, 9.18.1, 9.16.27-S1 or later.

CVSS Score:
4.3

CVSS Vector:
AV:N/AC:M/Au:N/C:N/I:N/A:P

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2022-0396
https://kb.isc.org/v1/docs/cve-2022-0396
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYD7US4HZRFUGAJ66ZTHFBYVP5N3OQBY/
https://security.gentoo.org/glsa/202210-25
CopyrightCopyright (C) 2022 Greenbone Networks GmbH

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.