Page 2 of 14 results (0.004 seconds)

CVSS: 5.3EPSS: 0%CPEs: 35EXPL: 0

21 Sep 2022 — By flooding the target resolver with queries exploiting this flaw an attacker can significantly impair the resolver's performance, effectively denying legitimate clients access to the DNS resolution service. Al inundar el resolvedor de destino con consultas que explotan este fallo, un atacante puede perjudicar significativamente el rendimiento del resolvedor, negando efectivamente a los clientes legítimos el acceso al servicio de resolución DNS A flaw was found in bind. When flooding the target resolver wit... • http://www.openwall.com/lists/oss-security/2022/09/21/3 • CWE-400: Uncontrolled Resource Consumption •

CVSS: 7.8EPSS: 0%CPEs: 9EXPL: 0

21 Sep 2022 — By sending specific queries to the resolver, an attacker can cause named to crash. Mediante el envío de consultas específicas al resolver, un atacante puede causar la caída de named A flaw was found in the Bind package, where the resolver can crash when stale cache and stale answers are enabled, option stale-answer-client-timeout is set to 0 and there is a stale CNAME in the cache for an incoming query. By sending specific queries to the resolver, an attacker can cause named to crash. Yehuda Afek, Anat Brem... • http://www.openwall.com/lists/oss-security/2022/09/21/3 • CWE-20: Improper Input Validation CWE-613: Insufficient Session Expiration •

CVSS: 8.5EPSS: 0%CPEs: 2EXPL: 0

21 Sep 2022 — The underlying bug might cause read past end of the buffer and either read memory it should not read, or crash the process. Un fallo subyacente podría causar que sea leído más allá del final del buffer y que sea leída memoria que no debería leer, o que bloqueará el proceso Yehuda Afek, Anat Bremler-Barr, and Shani Stajnrod discovered that Bind incorrectly handled large delegations. A remote attacker could possibly use this issue to reduce performance, leading to a denial of service. It was discovered that B... • http://www.openwall.com/lists/oss-security/2022/09/21/3 • CWE-125: Out-of-bounds Read •

CVSS: 7.5EPSS: 0%CPEs: 12EXPL: 0

19 May 2022 — On vulnerable configurations, the named daemon may, in some circumstances, terminate with an assertion failure. Vulnerable configurations are those that include a reference to http within the listen-on statements in their named.conf. TLS is used by both DNS over TLS (DoT) and DNS over HTTPS (DoH), but configurations using DoT alone are unaffected. Affects BIND 9.18.0 -> 9.18.2 and version 9.19.0 of the BIND 9.19 development branch. En configuraciones vulnerables, el demonio nombrado puede, en algunas circun... • https://kb.isc.org/docs/cve-2022-1183 • CWE-617: Reachable Assertion •