Lucene search

K
hiveproHive ProHIVEPRO:E8FD3A77E9767CCAEFD160DF64A486A3
HistoryMar 22, 2022 - 7:19 a.m.

Berkeley Internet Name Domain (BIND) affected by multiple vulnerabilities

2022-03-2207:19:52
Hive Pro
www.hivepro.com
8

THREAT LEVEL: Amber. For a detailed advisory, download the pdf file here The Internet Systems Consortium (ISC) has published security upgrades to address several vulnerabilities in the widely used Berkeley Internet Name Domain (BIND) server software. An attacker could take advantage of some of these vulnerabilities to gain elevated privileges, cause BIND process to terminate, or cause DNS cache poisoning. None of these vulnerabilities have been known to be exploited in the wild so far. All these vulnerabilities have been fixed in versions 9.16.27 & 9.18.1. Organizations should update them using the patch links below Potential MITRE ATT&CK TTPs are: TA0042: Resource Development T1588: Obtain Capabilities T1588.006: Obtain Capabilities: Vulnerabilities TA0001: Initial Access T1190: Exploit Public-Facing Application TA0040: Impact T1498: Network Denial of Service T1498.001: Network Denial of Service: Direct Network Flood TA0006: Credential Access TA0009: Collection T1557: Adversary-in-the-Middle Vulnerability Details Patch Link https://www.isc.org/bind/ References https://kb.isc.org/docs/cve-2021-25220 https://kb.isc.org/docs/cve-2022-0635 https://kb.isc.org/docs/cve-2022-0667 https://kb.isc.org/docs/cve-2022-0396 https://www.cisa.gov/uscert/ncas/current-activity/2022/03/17/isc-releases-security-advisories-bind