By flooding the target resolver with queries exploiting this flaw an attacker can significantly impair the resolver's performance, effectively denying legitimate clients access to the DNS resolution service.
Advisories
Source ID Title
Debian DLA Debian DLA DLA-3138-1 bind9 security update
Debian DSA Debian DSA DSA-5235-1 bind9 security update
EUVD EUVD EUVD-2022-35036 By flooding the target resolver with queries exploiting this flaw an attacker can significantly impair the resolver's performance, effectively denying legitimate clients access to the DNS resolution service.
Ubuntu USN Ubuntu USN USN-5626-1 Bind vulnerabilities
Ubuntu USN Ubuntu USN USN-5626-2 Bind vulnerabilities
Fixes

Solution

Upgrade to the patched release most closely related to your current version of BIND: BIND 9.16.33, BIND 9.18.7, BIND 9.19.5, or for BIND Supported Preview Edition (a special feature preview branch of BIND provided to eligible ISC support customers): BIND 9.16.33-S1.


Workaround

No workarounds known.

History

Fri, 29 Nov 2024 12:30:00 +0000

Type Values Removed Values Added
References

Wed, 18 Sep 2024 08:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:isc:bind:9.0.0:-:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.16.8:s1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.19.0:*:*:*:-:*:*:*
cpe:2.3:a:isc:bind:9.9.3:s1:*:*:*:*:*:*
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: isc

Published:

Updated: 2024-11-29T12:04:33.614Z

Reserved: 2022-08-12T00:00:00

Link: CVE-2022-2795

cve-icon Vulnrichment

Updated: 2024-11-29T12:04:33.614Z

cve-icon NVD

Status : Modified

Published: 2022-09-21T11:15:09.470

Modified: 2024-11-29T12:15:04.500

Link: CVE-2022-2795

cve-icon Redhat

Severity : Moderate

Publid Date: 2022-09-21T00:00:00Z

Links: CVE-2022-2795 - Bugzilla

cve-icon OpenCVE Enrichment

No data.