• Menu
  • Skip to main content
  • Skip to primary sidebar

All Tech News

Latest Technology News

ISC Releases Security Patches for New BIND DNS Software Vulnerabilities

You are here: Home / Cyber Security News / ISC Releases Security Patches for New BIND DNS Software Vulnerabilities

The Internet Methods Consortium (ISC) has introduced patches to handle a number of security vulnerabilities in the Berkeley Internet Identify Domain (BIND) 9 Area Title Process (DNS) computer software suite that could lead to a denial-of-service (DoS) condition.

“A distant attacker could exploit these vulnerabilities to potentially cause denial-of-services problems and process failures,” the U.S. Cybersecurity and Infrastructure Security Agency (CISA) stated in an advisory introduced Friday.

The open resource program is utilised by major economic companies, nationwide and global carriers, internet assistance providers (ISPs), suppliers, brands, educational institutions, and govt entities, in accordance to its site.

All four flaws reside in named, a BIND9 company that capabilities as an authoritative nameserver for a fixed set of DNS zones or as a recursive resolver for consumers on a nearby network.

The record of the bugs, which are rated 7.5 on the CVSS scoring system, is as follows –

  • CVE-2022-3094 – An UPDATE concept flood might trigger named to exhaust all obtainable memory
  • CVE-2022-3488 – BIND Supported Preview Version named may terminate unexpectedly when processing ECS options in repeated responses to iterative queries
  • CVE-2022-3736 – named configured to reply from stale cache may possibly terminate unexpectedly although processing RRSIG queries
  • CVE-2022-3924 – named configured to respond to from stale cache may well terminate unexpectedly at recursive-customers tender quota

Effective exploitation of the vulnerabilities could bring about the named services to crash or exhaust offered memory on a concentrate on server.

The issues impact versions 9.16. to 9.16.36, 9.18. to 9.18.10, 9.19. to 9.19.8, and 9.16.8-S1 to 9.16.36-S1. CVE-2022-3488 also impacts BIND Supported Preview Edition versions 9.11.4-S1 to 9.11.37-S1. They have been fixed in versions 9.16.37, 9.18.11, 9.19.9, and 9.16.37-S1.

Although there is no proof that any of these vulnerabilities are becoming actively exploited, buyers are encouraged to enhance to the most current variation as shortly as feasible to mitigate probable threats.

Uncovered this report exciting? Follow us on Twitter  and LinkedIn to go through far more distinctive content material we put up.

Some parts of this article are sourced from:
thehackernews.com

Previous Post: « Ukraine Hit with New Golang-based ‘SwiftSlicer’ Wiper Malware in Latest Cyber Attack
Next Post: Eliminating SaaS Shadow IT is Now Available via a Self-Service Product, Free of Charge »

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Recent Posts

  • Hackers Use Leaked Shellter Tool License to Spread Lumma Stealer and SectopRAT Malware
  • Anatsa Android Banking Trojan Hits 90,000 Users with Fake PDF App on Google Play
  • Malicious Pull Request Infects 6,000+ Developers via Vulnerable Ethcode VS Code Extension
  • 5 Ways Identity-based Attacks Are Breaching Retail
  • RondoDox Botnet Exploits Flaws in TBK DVRs and Four-Faith Routers to Launch DDoS Attacks

Copyright © 2025 · AllTech.News, All Rights Reserved.