Lucene search

K

11 matches found

CVE
CVE
added 2022/03/23 1:15 p.m.749 views

CVE-2021-25220

BIND 9.11.0 -> 9.11.36 9.12.0 -> 9.16.26 9.17.0 -> 9.18.0 BIND Supported Preview Editions: 9.11.4-S1 -> 9.11.36-S1 9.16.8-S1 -> 9.16.26-S1 Versions of BIND 9 earlier than those shown - back to 9.1.0, including Supported Preview Editions - are also believed to be affected but have not...

6.8CVSS7AI score0.00091EPSS
CVE
CVE
added 2022/09/21 11:15 a.m.678 views

CVE-2022-2795

By flooding the target resolver with queries exploiting this flaw an attacker can significantly impair the resolver's performance, effectively denying legitimate clients access to the DNS resolution service.

5.3CVSS6.5AI score0.00363EPSS
CVE
CVE
added 2022/09/21 11:15 a.m.467 views

CVE-2022-38178

By spoofing the target resolver with responses that have a malformed EdDSA signature, an attacker can trigger a small memory leak. It is possible to gradually erode available memory to the point where named crashes for lack of resources.

7.5CVSS7.8AI score0.00758EPSS
CVE
CVE
added 2022/09/21 11:15 a.m.464 views

CVE-2022-38177

By spoofing the target resolver with responses that have a malformed ECDSA signature, an attacker can trigger a small memory leak. It is possible to gradually erode available memory to the point where named crashes for lack of resources.

7.5CVSS7.8AI score0.00619EPSS
CVE
CVE
added 2022/03/23 11:15 a.m.318 views

CVE-2022-0396

BIND 9.16.11 -> 9.16.26, 9.17.0 -> 9.18.0 and versions 9.16.11-S1 -> 9.16.26-S1 of the BIND Supported Preview Edition. Specifically crafted TCP streams can cause connections to BIND to remain in CLOSE_WAIT status for an indefinite period of time, even after the client has terminated the co...

5.3CVSS5.9AI score0.00011EPSS
CVE
CVE
added 2022/09/21 11:15 a.m.196 views

CVE-2022-3080

By sending specific queries to the resolver, an attacker can cause named to crash.

7.5CVSS7.5AI score0.00103EPSS
CVE
CVE
added 2022/05/19 10:15 a.m.174 views

CVE-2022-1183

On vulnerable configurations, the named daemon may, in some circumstances, terminate with an assertion failure. Vulnerable configurations are those that include a reference to http within the listen-on statements in their named.conf. TLS is used by both DNS over TLS (DoT) and DNS over HTTPS (DoH), ...

7.5CVSS7.3AI score0.00392EPSS
CVE
CVE
added 2022/03/22 12:15 p.m.164 views

CVE-2022-0667

When the vulnerability is triggered the BIND process will exit. BIND 9.18.0

7.5CVSS7.5AI score0.00694EPSS
CVE
CVE
added 2022/03/23 12:15 p.m.136 views

CVE-2022-0635

Versions affected: BIND 9.18.0 When a vulnerable version of named receives a series of specific queries, the named process will eventually terminate due to a failed assertion check.

7.5CVSS7.3AI score0.00781EPSS
CVE
CVE
added 2022/09/21 11:15 a.m.84 views

CVE-2022-2881

The underlying bug might cause read past end of the buffer and either read memory it should not read, or crash the process.

8.2CVSS6.6AI score0.00566EPSS
CVE
CVE
added 2022/09/21 11:15 a.m.78 views

CVE-2022-2906

An attacker can leverage this flaw to gradually erode available memory to the point where named crashes for lack of resources. Upon restart the attacker would have to begin again, but nevertheless there is the potential to deny service.

7.5CVSS7.4AI score0.00293EPSS