cve/2022/CVE-2022-3080.md

18 lines
1.1 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2022-3080](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3080)
![](https://img.shields.io/static/v1?label=Product&message=BIND9&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=Open%20Source%20Branch%209.169.16.14%20through%20versions%20before%209.16.33%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=In%20BIND%209.16.14%20-%3E%209.16.32%2C%209.18.0%20-%3E%209.18.6%2C%20versions%209.16.14-S1%20-%3E%209.16.32-S1%20of%20the%20BIND%20Supported%20Preview%20Edition%2C%20and%20versions%209.19.0%20-%3E%209.19.4%20of%20the%20BIND%209.19%20development%20branch%2C%20a%20BIND%209%20resolver%20can%20crash%20when%20stale%20cache%20and%20stale%20answers%20are%20enabled%2C%20option%20stale-answer-client-timeout%20is%20set%20to%200%20and%20there%20is%20a%20stale%20CNAME%20in%20the%20cache%20for%20an%20incoming%20query.&color=brighgreen)
### Description
By sending specific queries to the resolver, an attacker can cause named to crash.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/karimhabush/cyberowl