QID 15134

Date Published: 2023-05-29

QID 15134: ISC BIND Buffer Overflow Vulnerability (CVE-2022-3094)

ISC BIND (Berkley Internet Domain Name) is an implementation of DNS protocols.

Memory is allocated prior to the checking of access permissions (ACLs) and is retained during the processing of a dynamic update from a client whose access credentials are accepted. Memory allocated to clients that are not permitted to send updates is released immediately upon rejection. The scope of this vulnerability is limited therefore to trusted clients who are permitted to make dynamic zone changes. Affected software:
BIND 9.16.0 - 9.16.36
BIND 9.18.0 - 9.18.10
BIND 9.19.0 - 9.19.8
BIND 9.16.8-S1 - 9.16.36-S1

Patched Versions:
BIND 9.16.37
BIND 9.18.11
BIND 9.19.9
BIND 9.16.37-S1

QID Detection Logic:
This unauthenticated check detects vulnerable systems by fetching the version information from the BIND service.

Successfully exploitation could affects integrity, availability, confidentiality

  • CVSS V3 rated as High - 7.5 severity.
  • CVSS V2 rated as High - 6.4 severity.
  • Solution
    Customers are advised to upgrade to the patched version 9.16.37, 9.18.11, 9.19.9, 9.16.37-S1 or latest release of ISC BIND.
    Vendor References

    CVEs related to QID 15134

    Software Advisories
    Advisory ID Software Component Link
    CVE-2022-3094 URL Logo kb.isc.org/v1/docs/cve-2022-3094