Description
By spoofing the target resolver with responses that have a malformed ECDSA signature, an attacker can trigger a small memory leak. It is possible to gradually erode available memory to the point where named crashes for lack of resources.
Published: 2022-09-21
Score: 7.5 High
EPSS: 1.6% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Solution

Upgrade to the patched release most closely related to your current version of BIND: BIND 9.16.33, or for BIND Supported Preview Edition (a special feature preview branch of BIND provided to eligible ISC support customers): BIND 9.16.33-S1.


Vendor Workaround

Disable the following algorithms in your configuration using the disable-algorithms option: ECDSAP256SHA256, ECDSAP384SHA384. Note that this causes zones signed with these algorithms to be treated as insecure.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-3138-1 bind9 security update
Debian DSA Debian DSA DSA-5235-1 bind9 security update
EUVD EUVD EUVD-2022-40773 By spoofing the target resolver with responses that have a malformed ECDSA signature, an attacker can trigger a small memory leak. It is possible to gradually erode available memory to the point where named crashes for lack of resources.
Ubuntu USN Ubuntu USN USN-5626-1 Bind vulnerabilities
Ubuntu USN Ubuntu USN USN-5626-2 Bind vulnerabilities
History

Wed, 28 May 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Subscriptions

Debian Debian Linux
Fedoraproject Fedora
Isc Bind
Netapp Active Iq Unified Manager
Redhat Enterprise Linux Rhel E4s Rhel Eus Rhev Hypervisor
cve-icon MITRE

Status: PUBLISHED

Assigner: isc

Published:

Updated: 2025-05-28T15:23:30.627Z

Reserved: 2022-08-12T00:00:00.000Z

Link: CVE-2022-38177

cve-icon Vulnrichment

Updated: 2024-08-03T10:45:52.975Z

cve-icon NVD

Status : Modified

Published: 2022-09-21T11:15:09.677

Modified: 2025-05-28T16:15:26.473

Link: CVE-2022-38177

cve-icon Redhat

Severity : Important

Publid Date: 2022-09-21T00:00:00Z

Links: CVE-2022-38177 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses