QID 15133
Date Published: 2023-05-29
QID 15133: ISC BIND Assertion Failure Vulnerability
ISC BIND (Berkley Internet Domain Name) is an implementation of DNS protocols.
Affected versions:
BIND 9.16.12 - 9.16.36
BIND 9.18.0 - 9.18.10
BIND 9.19.0 - 9.19.8
BIND 9.16.12-S1 - 9.16.36-S1
Patched Versions:
BIND 9.16.37
BIND 9.18.11
BIND 9.19.9
BIND 9.16.37-S1
QID Detection Logic:
This unauthenticated check detects vulnerable systems by fetching the version information from the BIND service.
Successfully exploitation could affects integrity, availability, confidentiality
Solution
Customers are advised to upgrade to the patched version 9.16.37, 9.18.11, 9.19.9, 9.16.37-S1 or latest release of ISC BIND.
Workaround:
Setting stale-answer-client-timeout to 0 or to off/disabled will prevent BIND from crashing due to this issue.
Workaround:
Setting stale-answer-client-timeout to 0 or to off/disabled will prevent BIND from crashing due to this issue.
Vendor References
- BIND CVE-2022-3736 -
kb.isc.org/docs/cve-2022-3736 - BIND CVE-2022-3924 -
kb.isc.org/docs/cve-2022-3924
CVEs related to QID 15133
Software Advisories
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| CVE-2022-3736 |
|
||
| CVE-2022-3924 |
|