{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2022-0396","assignerOrgId":"404fd4d2-a609-4245-b543-2c944a302a22","assignerShortName":"isc","datePublished":"2022-03-23T10:45:13.589Z","dateUpdated":"2024-09-16T19:05:24.544Z","dateReserved":"2022-01-27T00:00:00.000Z"},"containers":{"cna":{"title":"DoS from specifically crafted TCP packets","datePublic":"2022-03-16T00:00:00.000Z","providerMetadata":{"orgId":"404fd4d2-a609-4245-b543-2c944a302a22","shortName":"isc","dateUpdated":"2022-10-31T00:00:00.000Z"},"descriptions":[{"lang":"en","value":"BIND 9.16.11 -> 9.16.26, 9.17.0 -> 9.18.0 and versions 9.16.11-S1 -> 9.16.26-S1 of the BIND Supported Preview Edition. Specifically crafted TCP streams can cause connections to BIND to remain in CLOSE_WAIT status for an indefinite period of time, even after the client has terminated the connection."}],"affected":[{"vendor":"ISC","product":"BIND","versions":[{"version":"Open Source Branch 9.16 9.16.11 through versions before 9.16.27","status":"affected"},{"version":"Development Branch 9.17 BIND 9.17 all versions","status":"affected"},{"version":"Open Source Branch 9.18 9.18.0","status":"affected"},{"version":"Supported Preview Branch 9.16-S 9.16.11-S through versions before 9.16.27-S","status":"affected"}]}],"references":[{"url":"https://kb.isc.org/v1/docs/cve-2022-0396"},{"name":"FEDORA-2022-14e36aac0c","tags":["vendor-advisory"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NYD7US4HZRFUGAJ66ZTHFBYVP5N3OQBY/"},{"url":"https://security.netapp.com/advisory/ntap-20220408-0001/"},{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf"},{"name":"GLSA-202210-25","tags":["vendor-advisory"],"url":"https://security.gentoo.org/glsa/202210-25"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"LOW","baseScore":5.3,"baseSeverity":"MEDIUM"}}],"problemTypes":[{"descriptions":[{"type":"text","lang":"en","description":"ISC recently discovered an issue in BIND that allows TCP connection slots to be consumed for an indefinite time frame via a specifically crafted TCP stream sent from a client. This issue is present in BIND. BIND 9.16.11 -> 9.16.26, 9.17.0 -> 9.18.0 and versions 9.16.11-S1 -> 9.16.26-S1 of the BIND Supported Preview Edition. 9.16.11 to 9.16.26 (including S editions), and 9.18.0. This issue can only be triggered on BIND servers which have keep-response-order enabled, which is not the default configuration. The keep-response-order option is an ACL block; any hosts which are specified within it will be able to trigger this issue on affected versions. BIND 9.16.11 -> 9.16.26, 9.17.0 -> 9.18.0 and versions 9.16.11-S1 -> 9.16.26-S1 of the BIND Supported Preview Edition."}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"discovery":"INTERNAL"},"workarounds":[{"lang":"en","value":"To mitigate this issue in all affected versions of BIND, use the default setting of keep-response-order { none; }.\nActive exploits: We are not aware of any active exploits."}],"solutions":[{"lang":"en","value":"Upgrade to the patched release most closely related to your current version of BIND:\n    9.16.27\n    9.18.1\nBIND Supported Preview Edition is a special feature-preview branch of BIND provided to eligible ISC support customers.\n    9.16.27-S1"}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T23:25:40.544Z"},"title":"CVE Program Container","references":[{"url":"https://kb.isc.org/v1/docs/cve-2022-0396","tags":["x_transferred"]},{"name":"FEDORA-2022-14e36aac0c","tags":["vendor-advisory","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NYD7US4HZRFUGAJ66ZTHFBYVP5N3OQBY/"},{"url":"https://security.netapp.com/advisory/ntap-20220408-0001/","tags":["x_transferred"]},{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf","tags":["x_transferred"]},{"name":"GLSA-202210-25","tags":["vendor-advisory","x_transferred"],"url":"https://security.gentoo.org/glsa/202210-25"}]}]}}