Vulnerability Name: | CVE-2022-38177 (CCN-236705) | ||||||||||||||||||||||||||||||||||||
Assigned: | 2022-09-21 | ||||||||||||||||||||||||||||||||||||
Published: | 2022-09-21 | ||||||||||||||||||||||||||||||||||||
Updated: | 2023-02-28 | ||||||||||||||||||||||||||||||||||||
Summary: | By spoofing the target resolver with responses that have a malformed ECDSA signature, an attacker can trigger a small memory leak. It is possible to gradually erode available memory to the point where named crashes for lack of resources. | ||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) 6.5 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
6.5 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
6.5 Medium (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 7.8 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C)
| ||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-401 | ||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Denial of Service | ||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2022-38177 Source: security-officer@isc.org Type: Mailing List, Patch, Third Party Advisory security-officer@isc.org Source: XF Type: UNKNOWN isc-bind-cve202238177-dos(236705) Source: CCN Type: ISC Web site CVE-2022-38177: Memory leak in ECDSA DNSSEC verification code Source: security-officer@isc.org Type: Patch, Third Party Advisory security-officer@isc.org Source: security-officer@isc.org Type: Mailing List, Third Party Advisory security-officer@isc.org Source: security-officer@isc.org Type: Mailing List, Third Party Advisory security-officer@isc.org Source: security-officer@isc.org Type: Mailing List, Third Party Advisory security-officer@isc.org Source: security-officer@isc.org Type: Mailing List, Third Party Advisory security-officer@isc.org Source: security-officer@isc.org Type: Third Party Advisory security-officer@isc.org Source: security-officer@isc.org Type: Third Party Advisory security-officer@isc.org Source: security-officer@isc.org Type: Third Party Advisory security-officer@isc.org Source: CCN Type: IBM Security Bulletin 6833558 (Voice Gateway) Multiple Vulnerabilities in base image packages affect IBM Voice Gateway Source: CCN Type: IBM Security Bulletin 6838295 (QRadar Network Packet Capture) IBM QRadar Network Packet Capture includes components with multiple known vulnerabilities. Source: CCN Type: IBM Security Bulletin 6841885 (i) ISC BIND on IBM i is vulnerable to denial of service due to memory leaks and a flaw in resolver code (CVE-2022-2795, CVE-2022-38177, CVE-2022-38178) Source: CCN Type: IBM Security Bulletin 6851445 (AIX) AIX is vulnerable to denial of service due to ISC BIND (CVE-2022-38178, CVE-2022-3080, CVE-2022-38177, CVE-2022-2795) Source: CCN Type: IBM Security Bulletin 6852401 (Integrated Analytics System) Vulnerability in bind affects IBM Integrated Analytics System [CVE-2022-38177] Source: CCN Type: IBM Security Bulletin 6857803 (Cloud Pak for Watson AIOps) Multiple Vulnerabilities in CloudPak for Watson AIOPs Source: CCN Type: IBM Security Bulletin 6955057 (Security QRadar SIEM) IBM QRadar SIEM includes multiple components with known vulnerabilities Source: CCN Type: IBM Security Bulletin 6962223 (Robotic Process Automation) IBM Robotic Process Automation for Cloud Pak may be vulnerable to a denial of service due to ISC BIND (CVE-2022-38177, CVE-2022-38178). Source: CCN Type: Mend Vulnerability Database CVE-2022-38177 | ||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration RedHat 1: Configuration CCN 1: ![]() | ||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||
BACK |