Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

ISC BIND DoS Vulnerability (CVE-2022-0396) - Windows

Information

Severity

Severity

Medium

Family

Family

Denial of Service

CVSSv2 Base

CVSSv2 Base

5.0

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:L/Au:N/C:N/I:N/A:P

Solution Type

Solution Type

Vendor Patch

Created

Created

2 years ago

Modified

Modified

2 years ago

Summary

ISC BIND is prone to a denial of service (DoS) vulnerability.

Insight

Insight

ISC recently discovered an issue in BIND that allows TCP connection slots to be consumed for an indefinite time frame via a specifically crafted TCP stream sent from a client. This issue is present in BIND 9.16.11 to 9.16.26 (including S editions), and 9.18.0. This issue can only be triggered on BIND servers which have keep-response-order enabled, which is not the default configuration. The keep-response-order option is an ACL block, any hosts which are specified within it will be able to trigger this issue on affected versions.

Affected Software

Affected Software

ISC BIND versions 9.16.11 through 9.16.26, 9.17.0 through 9.18.0 and 9.16.11-S1 through 9.16.26-S1.

Detection Method

Detection Method

Checks if a vulnerable version is present on the target host.

Solution

Solution

Update to version 9.16.27, 9.18.1, 9.16.27-S1 or later.

Common Vulnerabilities and Exposures (CVE)