Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2022-2906

Опубликовано: 21 сент. 2022
Источник: debian
EPSS Низкий

Описание

An attacker can leverage this flaw to gradually erode available memory to the point where named crashes for lack of resources. Upon restart the attacker would have to begin again, but nevertheless there is the potential to deny service.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
bind9fixed1:9.18.7-1package
bind9not-affectedbullseyepackage
bind9not-affectedbusterpackage

Примечания

  • https://kb.isc.org/docs/cve-2022-2906

  • Introduced after: https://gitlab.isc.org/isc-projects/bind9/-/commit/e18777c7582d54d227714882e9e79746ce48e002 (v9_17_20)

  • Fixed by: https://gitlab.isc.org/isc-projects/bind9/-/commit/73df5c80538970ee1fbc4fe3348109bdc281e197 (v9_18_7)

EPSS

Процентиль: 47%
0.00239
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
почти 3 года назад

An attacker can leverage this flaw to gradually erode available memory to the point where named crashes for lack of resources. Upon restart the attacker would have to begin again, but nevertheless there is the potential to deny service.

CVSS3: 7.5
redhat
почти 3 года назад

An attacker can leverage this flaw to gradually erode available memory to the point where named crashes for lack of resources. Upon restart the attacker would have to begin again, but nevertheless there is the potential to deny service.

CVSS3: 7.5
nvd
почти 3 года назад

An attacker can leverage this flaw to gradually erode available memory to the point where named crashes for lack of resources. Upon restart the attacker would have to begin again, but nevertheless there is the potential to deny service.

CVSS3: 7.5
github
почти 3 года назад

An attacker can leverage this flaw to gradually erode available memory to the point where named crashes for lack of resources. Upon restart the attacker would have to begin again, but nevertheless there is the potential to deny service.

CVSS3: 7.5
fstec
почти 3 года назад

Уязвимость реализации алгоритма Диффи-Хеллмана сервера DNS BIND, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 47%
0.00239
Низкий