An UPDATE message flood may cause named to exhaust all available memory
CVE-2022-3094

7.5HIGH

Key Information:

Vendor
Isc
Status
Vendor
CVE Published:
26 January 2023

Badges

👾 Exploit Exists

Summary

A vulnerability exists in BIND that allows for memory resource exhaustion through a flood of dynamic DNS updates. When access permissions are checked after memory allocation, trusted clients can potentially overwhelm the system, causing 'named' to exit due to insufficient memory. While memory is released for rejected updates almost instantly, the risk emerges when invalid updates are sent at scale. This issue impacts BIND versions 9.16.0 to 9.16.36, 9.18.0 to 9.18.10, 9.19.0 to 9.19.8, and 9.16.8-S1 to 9.16.36-S1.

Affected Version(s)

BIND 9 9.16.0 <= 9.16.36

BIND 9 9.18.0 <= 9.18.10

BIND 9 9.19.0 <= 9.19.8

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

ISC would like to thank Rob Schulhof from Infoblox for bringing this vulnerability to our attention.
.