
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-38178 is a vulnerability discovered in BIND (Berkeley Internet Name Domain) DNS server implementation. By spoofing the target resolver with responses that have a malformed EdDSA signature, an attacker can trigger a small memory leak. The vulnerability was disclosed on September 21, 2022, affecting multiple versions of BIND 9, including versions from 9.9.12 through 9.16.32 (ISC Advisory).
The vulnerability exists in the DNSSEC verification code specifically related to the EdDSA algorithm implementation. When processing responses with malformed EdDSA signatures, the system fails to properly manage memory resources. The vulnerability has been assigned a CVSS v3.1 base score of 7.5 (HIGH) with a vector of CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H, indicating it can be exploited remotely without requiring privileges or user interaction (NVD).
The primary impact of this vulnerability is the potential for denial of service (DoS). An attacker can gradually erode available memory to the point where the named service crashes due to lack of resources. This can result in disruption of DNS services for affected systems (Debian Advisory).
The vulnerability has been fixed in BIND version 9.16.33. System administrators are advised to upgrade to this version or later. Multiple Linux distributions have released security updates to address this vulnerability, including Debian (version 1:9.16.33-1~deb11u1), Fedora, and Gentoo (Debian Advisory, Gentoo Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."