Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2022-2906

Опубликовано: 21 сент. 2022
Источник: debian
EPSS Низкий

Описание

An attacker can leverage this flaw to gradually erode available memory to the point where named crashes for lack of resources. Upon restart the attacker would have to begin again, but nevertheless there is the potential to deny service.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
bind9fixed1:9.18.7-1package
bind9not-affectedbullseyepackage
bind9not-affectedbusterpackage

Примечания

  • https://kb.isc.org/docs/cve-2022-2906

  • Introduced after: https://gitlab.isc.org/isc-projects/bind9/-/commit/e18777c7582d54d227714882e9e79746ce48e002 (v9_17_20)

  • Fixed by: https://gitlab.isc.org/isc-projects/bind9/-/commit/73df5c80538970ee1fbc4fe3348109bdc281e197 (v9_18_7)

EPSS

Процентиль: 42%
0.00192
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 2 лет назад

An attacker can leverage this flaw to gradually erode available memory to the point where named crashes for lack of resources. Upon restart the attacker would have to begin again, but nevertheless there is the potential to deny service.

CVSS3: 7.5
redhat
больше 2 лет назад

An attacker can leverage this flaw to gradually erode available memory to the point where named crashes for lack of resources. Upon restart the attacker would have to begin again, but nevertheless there is the potential to deny service.

CVSS3: 7.5
nvd
больше 2 лет назад

An attacker can leverage this flaw to gradually erode available memory to the point where named crashes for lack of resources. Upon restart the attacker would have to begin again, but nevertheless there is the potential to deny service.

CVSS3: 7.5
github
больше 2 лет назад

An attacker can leverage this flaw to gradually erode available memory to the point where named crashes for lack of resources. Upon restart the attacker would have to begin again, but nevertheless there is the potential to deny service.

CVSS3: 7.5
fstec
почти 3 года назад

Уязвимость реализации алгоритма Диффи-Хеллмана сервера DNS BIND, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 42%
0.00192
Низкий