
Cloud Vulnerability DB
A community-led vulnerabilities database
A buffer overread vulnerability in BIND 9's statistics channel code was discovered and assigned CVE-2022-2881. The vulnerability affects BIND versions from 9.18.0 to 9.18.7 and 9.19.0 to 9.19.5. This security issue was disclosed by Internet Systems Consortium (ISC) on September 21, 2022 (ISC Advisory, OSS Security).
The vulnerability is classified as an Out-of-bounds Read (CWE-125) that could cause the process to read past the end of a buffer. The severity assessment varies, with NVD assigning a CVSS v3.1 Base Score of 8.2 (HIGH) with vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H, while ISC rates it as MEDIUM severity with a score of 5.5 (NVD Database).
The vulnerability could lead to unauthorized memory access or process crashes. When exploited, the bug allows reading memory beyond buffer boundaries, potentially exposing sensitive information or causing denial of service through process termination (NVD Database).
ISC released patches to address this vulnerability in BIND versions 9.18.7 and later. Users are advised to upgrade to the fixed versions. For systems unable to upgrade immediately, no alternative workarounds have been publicly documented (ISC Advisory, Gentoo Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."