
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-3488 is a high-severity vulnerability (CVSS score: 7.5) affecting BIND 9 DNS software. The vulnerability impacts BIND 9 versions 9.11.4-S1 through 9.11.37-S1 and 9.16.8-S1 through 9.16.36-S1. The issue occurs during the processing of repeated responses to the same query, where both responses contain ECS pseudo-options, but where the first response is broken in some way, causing BIND to exit with an assertion failure (SecurityWeek, NVD).
The vulnerability is triggered when processing two responses in quick succession from the same nameserver, both containing ECS pseudo-options, with the first response being broken. A response is considered 'broken' if anything would cause the resolver to reject the query response, such as a mismatch between query and answer name. When processing the second response, the named service crashes due to an assertion failure (SecurityWeek).
Successful exploitation of this vulnerability can lead to a denial-of-service (DoS) condition by causing the BIND daemon (named) to crash (SecurityWeek, Hacker News).
The vulnerability has been patched in BIND preview edition version 9.16.37-S1. Users are strongly encouraged to upgrade to the latest version as soon as possible to mitigate potential threats (Hacker News).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."