Lucene search

K
debiancveDebian Security Bug TrackerDEBIANCVE:CVE-2022-3488
HistoryJan 26, 2023 - 9:15 p.m.

CVE-2022-3488

2023-01-2621:15:52
Debian Security Bug Tracker
security-tracker.debian.org
16
bind
cve-2022-3488
vulnerability
processing
repeated responses
ecs
pseudo-options
assertion failure
mismatch
query
version 9.11.4-s1
9.11.37-s1
9.16.8-s1
9.16.36-s1
unix

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

45.6%

Processing of repeated responses to the same query, where both responses contain ECS pseudo-options, but where the first is broken in some way, can cause BIND to exit with an assertion failure. ‘Broken’ in this context is anything that would cause the resolver to reject the query response, such as a mismatch between query and answer name. This issue affects BIND 9 versions 9.11.4-S1 through 9.11.37-S1 and 9.16.8-S1 through 9.16.36-S1.

OSVersionArchitecturePackageVersionFilename
Debian12allbind9< 1:9.18.24-1bind9_1:9.18.24-1_all.deb
Debian11allbind9< 1:9.16.48-1bind9_1:9.16.48-1_all.deb
Debian999allbind9< 1:9.19.24-185-g392e7199df2-1bind9_1:9.19.24-185-g392e7199df2-1_all.deb
Debian13allbind9< 1:9.19.24-185-g392e7199df2-1bind9_1:9.19.24-185-g392e7199df2-1_all.deb

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

45.6%