{
    "file_item": {
        "filepath": "security-advisories",
        "filename": "CERT-EU-SA2022-066.pdf"
    },
    "title": "Vulnerabilities affecting multiple versions of the BIND 9",
    "serial_number": "2022-066",
    "publish_date": "27-09-2022 12:05:00",
    "description": "On September 21, 2022, the Internet Systems Consortium (ISC) has released security advisories that address vulnerabilities affecting multiple versions of the ISC\u2019s Berkeley Internet Name Domain (BIND) 9. A remote attacker could exploit these vulnerabilities to potentially cause denial-of-service conditions.",
    "url_title": "2022-066",
    "content_markdown": "---\ntitle: 'Vulnerabilities affecting multiple versions of the BIND 9'\nversion: '1.0'\nnumber: '2022-066'\noriginal_date: 'September 21, 2022'\ndate: 'September 26, 2022'\n---\n\n_History:_\n\n* _27/09/2022 --- v1.0 -- Initial publication_\n\n# Summary\n\nOn September 21, 2022, the Internet Systems Consortium (ISC) has released security advisories that address vulnerabilities affecting multiple versions of the ISC\u2019s Berkeley Internet Name Domain (BIND) 9. A remote attacker could exploit these vulnerabilities to potentially cause denial-of-service conditions.[1]\n\n# Technical Details\n\nFrom the [BIND 9 Security Vulnerability Matrix](https://kb.isc.org/docs/aa-00913) published by ISC, four vulnerabilities have a 7.5 CVSS Score: \n\n- `CVE-2022-2906` - _Memory leaks in code handling Diffie-Hellman key exchange via TKEY RRs (OpenSSL 3.0.0+ only)_. [2]\n\nChanges between OpenSSL 1.x and OpenSSL 3.0 expose a flaw in `named` that causes a small memory leak in key processing when using TKEY records in Diffie-Hellman mode with OpenSSL 3.0.0 and later versions. An attacker can leverage this flaw to gradually erode available memory to the point where `named` crashes for lack of resources. Upon restart the attacker would have to begin again, but nevertheless there is the potential to deny service.\n\n\n- `CVE-2022-3080` - _BIND 9 resolvers configured to answer from stale cache with zero stale-answer-client-timeout may terminate unexpectedly._ [3]\n\nBIND 9 resolver can crash when stale cache and stale answers are enabled, option `stale-answer-client-timeout` is set to `0` and there is a stale CNAME in the cache for an incoming query. By sending specific queries to the resolver, an attacker can cause `named` to crash.\n\n- `CVE-2022-38177` and `CVE-2022-38178` - _Memory leak in ECDSA DNSSEC verification code._ [4][5]\n\nThe DNSSEC verification code for the ECDSA algorithm leaks memory when there is a signature length mismatch. By spoofing the target resolver with responses that have a malformed ECDSA signature, an attacker can trigger a small memory leak. It is possible to gradually erode available memory to the point where named crashes for lack of resources.\n\n# Affected Products\n\nMultiple versions of BIND 9.\n\n# Recommendations\n\nCERT-EU recommends applying the necessary mitigation provided by ISC through [CVE-2022-2906](https://kb.isc.org/v1/docs/cve-2022-2906), [CVE-2022-3080](https://kb.isc.org/v1/docs/cve-2022-3080), [CVE-2022-38177](https://kb.isc.org/v1/docs/cve-2022-38177), and [CVE-2022-38178](https://kb.isc.org/v1/docs/cve-2022-38178).\n\n# References\n\n[1] <https://www.cisa.gov/uscert/ncas/current-activity/2022/09/22/isc-releases-security-advisories-multiple-versions-bind-9>\n\n[2] <https://kb.isc.org/v1/docs/cve-2022-2906>\n\n[3] <https://kb.isc.org/v1/docs/cve-2022-3080>\n\n[4] <https://kb.isc.org/v1/docs/cve-2022-38177>\n\n[5] <https://kb.isc.org/v1/docs/cve-2022-38178>\n",
    "content_html": "<p><em>History:</em></p><ul><li><em>27/09/2022 --- v1.0 -- Initial publication</em></li></ul><h2 id=\"summary\">Summary</h2><p>On September 21, 2022, the Internet Systems Consortium (ISC) has released security advisories that address vulnerabilities affecting multiple versions of the ISC\u2019s Berkeley Internet Name Domain (BIND) 9. A remote attacker could exploit these vulnerabilities to potentially cause denial-of-service conditions.[1]</p><h2 id=\"technical-details\">Technical Details</h2><p>From the <a rel=\"noopener\" target=\"_blank\" href=\"https://kb.isc.org/docs/aa-00913\">BIND 9 Security Vulnerability Matrix</a> published by ISC, four vulnerabilities have a 7.5 CVSS Score: </p><ul><li><code>CVE-2022-2906</code> - <em>Memory leaks in code handling Diffie-Hellman key exchange via TKEY RRs (OpenSSL 3.0.0+ only)</em>. [2]</li></ul><p>Changes between OpenSSL 1.x and OpenSSL 3.0 expose a flaw in <code>named</code> that causes a small memory leak in key processing when using TKEY records in Diffie-Hellman mode with OpenSSL 3.0.0 and later versions. An attacker can leverage this flaw to gradually erode available memory to the point where <code>named</code> crashes for lack of resources. Upon restart the attacker would have to begin again, but nevertheless there is the potential to deny service.</p><ul><li><code>CVE-2022-3080</code> - <em>BIND 9 resolvers configured to answer from stale cache with zero stale-answer-client-timeout may terminate unexpectedly.</em> [3]</li></ul><p>BIND 9 resolver can crash when stale cache and stale answers are enabled, option <code>stale-answer-client-timeout</code> is set to <code>0</code> and there is a stale CNAME in the cache for an incoming query. By sending specific queries to the resolver, an attacker can cause <code>named</code> to crash.</p><ul><li><code>CVE-2022-38177</code> and <code>CVE-2022-38178</code> - <em>Memory leak in ECDSA DNSSEC verification code.</em> [4][5]</li></ul><p>The DNSSEC verification code for the ECDSA algorithm leaks memory when there is a signature length mismatch. By spoofing the target resolver with responses that have a malformed ECDSA signature, an attacker can trigger a small memory leak. It is possible to gradually erode available memory to the point where named crashes for lack of resources.</p><h2 id=\"affected-products\">Affected Products</h2><p>Multiple versions of BIND 9.</p><h2 id=\"recommendations\">Recommendations</h2><p>CERT-EU recommends applying the necessary mitigation provided by ISC through <a rel=\"noopener\" target=\"_blank\" href=\"https://kb.isc.org/v1/docs/cve-2022-2906\">CVE-2022-2906</a>, <a rel=\"noopener\" target=\"_blank\" href=\"https://kb.isc.org/v1/docs/cve-2022-3080\">CVE-2022-3080</a>, <a rel=\"noopener\" target=\"_blank\" href=\"https://kb.isc.org/v1/docs/cve-2022-38177\">CVE-2022-38177</a>, and <a rel=\"noopener\" target=\"_blank\" href=\"https://kb.isc.org/v1/docs/cve-2022-38178\">CVE-2022-38178</a>.</p><h2 id=\"references\">References</h2><p>[1] <a rel=\"noopener\" target=\"_blank\" href=\"https://www.cisa.gov/uscert/ncas/current-activity/2022/09/22/isc-releases-security-advisories-multiple-versions-bind-9\">https://www.cisa.gov/uscert/ncas/current-activity/2022/09/22/isc-releases-security-advisories-multiple-versions-bind-9</a></p><p>[2] <a rel=\"noopener\" target=\"_blank\" href=\"https://kb.isc.org/v1/docs/cve-2022-2906\">https://kb.isc.org/v1/docs/cve-2022-2906</a></p><p>[3] <a rel=\"noopener\" target=\"_blank\" href=\"https://kb.isc.org/v1/docs/cve-2022-3080\">https://kb.isc.org/v1/docs/cve-2022-3080</a></p><p>[4] <a rel=\"noopener\" target=\"_blank\" href=\"https://kb.isc.org/v1/docs/cve-2022-38177\">https://kb.isc.org/v1/docs/cve-2022-38177</a></p><p>[5] <a rel=\"noopener\" target=\"_blank\" href=\"https://kb.isc.org/v1/docs/cve-2022-38178\">https://kb.isc.org/v1/docs/cve-2022-38178</a></p>",
    "licence": {
        "title": "Creative Commons Attribution 4.0 International (CC-BY 4.0)",
        "link": "https://creativecommons.org/licenses/by/4.0/",
        "restrictions": "https://cert.europa.eu/legal-notice",
        "author": "The Cybersecurity Service for the Union institutions, bodies, offices and agencies"
    }
}