Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.126312
Categoría:Denial of Service
Título:ISC BIND DoS Vulnerability (CVE-2022-3094) - Linux
Resumen:ISC BIND is prone to a denial of service (DoS) vulnerability.
Descripción:Summary:
ISC BIND is prone to a denial of service (DoS) vulnerability.

Vulnerability Insight:
Sending a flood of dynamic DNS updates may cause named to
allocate large amounts of memory. This, in turn, may cause named to exit due to a lack of free
memory.

Memory is allocated prior to the checking of access permissions (ACLs) and is retained during the
processing of a dynamic update from a client whose access credentials are accepted. Memory
allocated to clients that are not permitted to send updates is released immediately upon
rejection. The scope of this vulnerability is limited therefore to trusted clients who are
permitted to make dynamic zone changes.

If a dynamic update is REFUSED, memory will be released again very quickly. Therefore it is only
likely to be possible to degrade or stop named by sending a flood of unaccepted dynamic updates
comparable in magnitude to a query flood intended to achieve the same detrimental outcome.

Vulnerability Impact:
By flooding the target server with UPDATE requests, the attacker
can exhaust all available memory on that server.

Affected Software/OS:
ISC BIND versions 9.16.0 through 9.16.36, 9.18.0 through
9.18.10, 9.19.0 through 9.19.8 and 19.16.8-S1 through 19.16.36-S1.

Solution:
Update to version 9.16.37, 9.18.11, 9.19.9, 9.16.37-S1 or
later.

CVSS Score:
7.8

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:C

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2022-3094
CVE-2022-3094
https://kb.isc.org/docs/cve-2022-3094
CopyrightCopyright (C) 2023 Greenbone Networks GmbH

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.