Four new vulnerabilities affecting the BIND DNS software have been released, two of them being high severity.
An attacker who successfully exploits these vulnerabilities can cause a “denial of service” on the affected server (For all these vulnerabilities, no analysis has been made and no CVSS scores have been assigned by NIST yet).
Affected Systems
The following servers/systems are affected by these vulnerabilities;
IoC’s
-
Recommended Solution(s)
Organizations using the following products are recommended to download the patches in the table below.
Version Affected | Version Remediated |
---|---|
9.11.x | 9.11.37 |
9.16.x | 9.16.27 |
9.18.x | 9.18.1 |
CVE / CWE
CVE-2021-25220, CVE-2022-0396, CVE-2022-0635, CVE-2022-0667
Related Website(s)
* Vulnerabilities with a CVSS 3.1 score between 7.0 and 8.9 are evaluated to be “high” whereas vulnerabilities with a CVSS 3.1 score between 9.0 and 10.0 are evaluated to be “critical”.
+90 216 504 53 32
Aydınevler Mahallesi,İsmet İnönü Cadddesi,Küçükyalı Ofis Park A Blok,No:20/1 Maltepe İstanbul
+90 312 235 44 51
You can register to our newsletter on the home page to be instantly informed about security vulnerabilities.