CVE-2022-0396

CWE-404CWE-7729 documents8 sources
Severity
5.3MEDIUM
EPSS
0.1%
top 71.48%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 23
Latest updateMar 24

Description

BIND 9.16.11 -> 9.16.26, 9.17.0 -> 9.18.0 and versions 9.16.11-S1 -> 9.16.26-S1 of the BIND Supported Preview Edition. Specifically crafted TCP streams can cause connections to BIND to remain in CLOSE_WAIT status for an indefinite period of time, even after the client has terminated the connection.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:LExploitability: 3.9 | Impact: 1.4

Affected Packages4 packages

NVDisc/bind9.16.119.16.27+1
Debianbind9< 1:9.16.27-1~deb11u1+3
CVEListV5isc/bind4 versions+3
NVDsiemens/sinec_ins< 1.0+1

Also affects: Fedora 34, 35, 36

Patches

🔴Vulnerability Details

4
GHSA
GHSA-wqqg-j8m9-9rcc: BIND 92022-03-24
OSV
CVE-2022-0396: BIND 92022-03-23
CVEList
DoS from specifically crafted TCP packets2022-03-23
OSV
bind9 vulnerabilities2022-03-17

📋Vendor Advisories

4
Ubuntu
Bind vulnerabilities2022-03-17
Red Hat
bind: DoS from specifically crafted TCP packets2022-03-16
Microsoft
DoS from specifically crafted TCP packets2022-03-08
Debian
CVE-2022-0396: bind9 - BIND 9.16.11 -> 9.16.26, 9.17.0 -> 9.18.0 and versions 9.16.11-S1 -> 9.16.26-S1 ...2022
CVE-2022-0396 (MEDIUM CVSS 5.3) | BIND 9.16.11 -> 9.16.26 | cvebase.io