QID 15138
Date Published: 2023-05-29
QID 15138: ISC BIND Assertion Failure Vulnerability
ISC BIND (Berkley Internet Domain Name) is an implementation of DNS protocols.
Affected versions:
BIND 9.16.14 - 9.16.32
BIND 9.18.0 - 9.18.6
BIND 9.19.0 - 9.19.4
BIND 9.16.14-S1 - 9.16.32-S1
Patched Versions:
BIND 9.16.33
BIND 9.18.7
BIND 9.19.5
BIND 9.16.33-S1
QID Detection Logic:
This unauthenticated check detects vulnerable systems by fetching the version information from the BIND service.
Successfully exploitation could affects integrity, availability, confidentiality
Solution
Customers are advised to upgrade to the patched version 9.16.33, 9.18.7, 9.19.5, 9.16.33-S1 or latest release of ISC BIND.
Workaround:
Setting stale-answer-client-timeout to off or to an integer greater than 0 will prevent BIND from crashing due to this issue.
Workaround:
Setting stale-answer-client-timeout to off or to an integer greater than 0 will prevent BIND from crashing due to this issue.
Vendor References
- CVE-2022-3080 -
kb.isc.org/v1/docs/cve-2022-3080
CVEs related to QID 15138
Software Advisories
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| CVE-2022-3080 |
|