Description
On vulnerable configurations, the named daemon may, in some circumstances, terminate with an assertion failure. Vulnerable configurations are those that include a reference to http within the listen-on statements in their named.conf. TLS is used by both DNS over TLS (DoT) and DNS over HTTPS (DoH), but configurations using DoT alone are unaffected. Affects BIND 9.18.0 -> 9.18.2 and version 9.19.0 of the BIND 9.19 development branch.
Published: 2022-05-19
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Solution

Upgrade to the patched release most closely related to your current version of BIND: BIND 9.18.3 or BIND 9.19.1.


Vendor Workaround

No workarounds known.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2022-24523 On vulnerable configurations, the named daemon may, in some circumstances, terminate with an assertion failure. Vulnerable configurations are those that include a reference to http within the listen-on statements in their named.conf. TLS is used by both DNS over TLS (DoT) and DNS over HTTPS (DoH), but configurations using DoT alone are unaffected. Affects BIND 9.18.0 -> 9.18.2 and version 9.19.0 of the BIND 9.19 development branch.
Ubuntu USN Ubuntu USN USN-5429-1 Bind vulnerability
History

No history.

Subscriptions

Isc Bind
Netapp H300s H300s Firmware H410c H410c Firmware H410s H410s Firmware H500s H500s Firmware H700s H700s Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: isc

Published:

Updated: 2024-09-17T04:00:26.575Z

Reserved: 2022-03-30T00:00:00.000Z

Link: CVE-2022-1183

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-05-19T10:15:09.413

Modified: 2024-11-21T06:40:12.373

Link: CVE-2022-1183

cve-icon Redhat

Severity : Moderate

Publid Date: 2022-05-18T00:00:00Z

Links: CVE-2022-1183 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses