Lucene search

K

11 matches found

CVE
CVE
added 2022/03/23 1:15 p.m.738 views

CVE-2021-25220

BIND 9.11.0 -> 9.11.36 9.12.0 -> 9.16.26 9.17.0 -> 9.18.0 BIND Supported Preview Editions: 9.11.4-S1 -> 9.11.36-S1 9.16.8-S1 -> 9.16.26-S1 Versions of BIND 9 earlier than those shown - back to 9.1.0, including Supported Preview Editions - are also believed to be affected but have not...

6.8CVSS7AI score0.00074EPSS
CVE
CVE
added 2022/09/21 11:15 a.m.663 views

CVE-2022-2795

By flooding the target resolver with queries exploiting this flaw an attacker can significantly impair the resolver's performance, effectively denying legitimate clients access to the DNS resolution service.

5.3CVSS6.5AI score0.00375EPSS
CVE
CVE
added 2022/09/21 11:15 a.m.453 views

CVE-2022-38178

By spoofing the target resolver with responses that have a malformed EdDSA signature, an attacker can trigger a small memory leak. It is possible to gradually erode available memory to the point where named crashes for lack of resources.

7.5CVSS7.8AI score0.00671EPSS
CVE
CVE
added 2022/09/21 11:15 a.m.449 views

CVE-2022-38177

By spoofing the target resolver with responses that have a malformed ECDSA signature, an attacker can trigger a small memory leak. It is possible to gradually erode available memory to the point where named crashes for lack of resources.

7.5CVSS7.8AI score0.00621EPSS
CVE
CVE
added 2022/03/23 11:15 a.m.309 views

CVE-2022-0396

BIND 9.16.11 -> 9.16.26, 9.17.0 -> 9.18.0 and versions 9.16.11-S1 -> 9.16.26-S1 of the BIND Supported Preview Edition. Specifically crafted TCP streams can cause connections to BIND to remain in CLOSE_WAIT status for an indefinite period of time, even after the client has terminated the co...

5.3CVSS5.9AI score0.0001EPSS
CVE
CVE
added 2022/09/21 11:15 a.m.190 views

CVE-2022-3080

By sending specific queries to the resolver, an attacker can cause named to crash.

7.5CVSS7.5AI score0.00084EPSS
CVE
CVE
added 2022/05/19 10:15 a.m.173 views

CVE-2022-1183

On vulnerable configurations, the named daemon may, in some circumstances, terminate with an assertion failure. Vulnerable configurations are those that include a reference to http within the listen-on statements in their named.conf. TLS is used by both DNS over TLS (DoT) and DNS over HTTPS (DoH), ...

7.5CVSS7.3AI score0.002EPSS
CVE
CVE
added 2022/03/22 12:15 p.m.162 views

CVE-2022-0667

When the vulnerability is triggered the BIND process will exit. BIND 9.18.0

7.5CVSS7.5AI score0.00694EPSS
CVE
CVE
added 2022/03/23 12:15 p.m.135 views

CVE-2022-0635

Versions affected: BIND 9.18.0 When a vulnerable version of named receives a series of specific queries, the named process will eventually terminate due to a failed assertion check.

7.5CVSS7.3AI score0.00781EPSS
CVE
CVE
added 2022/09/21 11:15 a.m.81 views

CVE-2022-2881

The underlying bug might cause read past end of the buffer and either read memory it should not read, or crash the process.

8.2CVSS6.6AI score0.00381EPSS
CVE
CVE
added 2022/09/21 11:15 a.m.75 views

CVE-2022-2906

An attacker can leverage this flaw to gradually erode available memory to the point where named crashes for lack of resources. Upon restart the attacker would have to begin again, but nevertheless there is the potential to deny service.

7.5CVSS7.4AI score0.00239EPSS