CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
AI Score
Confidence
High
EPSS
Percentile
54.4%
Debian LTS Advisory DLA-3457-1 [email protected]
https://www.debian.org/lts/security/ Bastien Roucariès
June 19, 2023 https://wiki.debian.org/LTS
Package : maradns
Version : 2.0.13-1.2+deb10u1
CVE ID : CVE-2022-30256 CVE-2023-31137
Debian Bug : 1033252 1035936
MaraDNS is a small and lightweight cross-platform open-source DNS server.
CVE-2022-30256
A revoked domain name (so called "Ghost" domain name) can still be
resolvable for a long time by staying in the cache longer than
max_ttl allows. "Ghost" domain names includes expired domains
and taken-down malicious domains.
CVE-2023-31137
The authoritative server in MaraDNS had an issue where it is
possible to remotely terminate the MaraDNS process with a
specialy crafted packet (so called "packet of death").
For Debian 10 buster, these problems have been fixed in version
2.0.13-1.2+deb10u1.
We recommend that you upgrade your maradns packages.
For the detailed security status of maradns please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/maradns
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 11 | mips64el | maradns-deadwood-dbgsym | < 2.0.13-1.4+deb11u1 | maradns-deadwood-dbgsym_2.0.13-1.4+deb11u1_mips64el.deb |
Debian | 11 | arm64 | maradns-zoneserver | < 2.0.13-1.4+deb11u1 | maradns-zoneserver_2.0.13-1.4+deb11u1_arm64.deb |
Debian | 11 | arm64 | maradns | < 2.0.13-1.4+deb11u1 | maradns_2.0.13-1.4+deb11u1_arm64.deb |
Debian | 11 | mipsel | maradns | < 2.0.13-1.4+deb11u1 | maradns_2.0.13-1.4+deb11u1_mipsel.deb |
Debian | 11 | ppc64el | duende-dbgsym | < 2.0.13-1.4+deb11u1 | duende-dbgsym_2.0.13-1.4+deb11u1_ppc64el.deb |
Debian | 10 | amd64 | duende | < 2.0.13-1.2+deb10u1 | duende_2.0.13-1.2+deb10u1_amd64.deb |
Debian | 10 | amd64 | maradns | < 2.0.13-1.2+deb10u1 | maradns_2.0.13-1.2+deb10u1_amd64.deb |
Debian | 10 | arm64 | duende-dbgsym | < 2.0.13-1.2+deb10u1 | duende-dbgsym_2.0.13-1.2+deb10u1_arm64.deb |
Debian | 11 | all | maradns-docs | < 2.0.13-1.4+deb11u1 | maradns-docs_2.0.13-1.4+deb11u1_all.deb |
Debian | 11 | mipsel | duende-dbgsym | < 2.0.13-1.4+deb11u1 | duende-dbgsym_2.0.13-1.4+deb11u1_mipsel.deb |
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
AI Score
Confidence
High
EPSS
Percentile
54.4%