containerblogpic.jpg

Infoblox NIOS products not vulnerable to CVE-2022-0396

Mar 16, 2022Knowledge
 

Summary:

On March 16, 2022 ISC announced a new security issue encountered  in BIND 9.18.0 as CVE-2022-0396.

 

Overview:

ISC recently discovered an issue in BIND that allows TCP connection slots to be consumed for an indefinite time frame via a specifically crafted TCP stream sent from a client. This issue is present in BIND 9.16.11 to 9.16.26 (including S editions), and 9.18.0.

This issue can only be triggered on BIND servers which have keep-response-order enabled, which is not the default configuration. The keep-response-order option is an ACL block, and as such, any hosts specified within it will be able to trigger this issue on affected versions.


Impact:
Specifically crafted TCP streams can cause connections to BIND to remain in CLOSE_WAIT status for an indefinite period of time, even after the client has terminated the connection.

CVSS Score: 4.9
CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:F/RLSmiley Surprised/RC:C

For more information on the Common Vulnerability Scoring System and to obtain your specific environmental score please visit: https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:F/...Smiley Surprised.

 
 

Affected Versions

NIOS Products are not vulnerable to this issue as they do not run any of the affected BIND releases.

 

Impact

There is no impact to Infoblox NIOS products

 

Workaround

No workaround necessary

 

Resolution

No actions needed

Showing results for 
Search instead for 
Did you mean: