Synology-SA-22:16 ISC BIND
Publish Time: 2022-09-27 11:39:29 UTC+8
Last Updated: 2022-09-27 11:39:29 UTC+8
- Severity
- Not affected
- Status
- Resolved
Abstract
None of Synology's products are affected by CVE-2022-2906 as this vulnerability only affects ISC BIND 9.18.0 and later.
None of Synology's products are affected by CVE-2022-3080, CVE-2022-38177, or CVE-2022-38178 as these vulnerabilities only affect when specific features are enabled.
Affected Products
Product | Severity | Fixed Release Availability |
---|---|---|
DNS Server for DSM 7.1 | Not affected | N/A |
DNS Server for DSM 7.0 | Not affected | N/A |
DNS Server for DSM 6.2 | Not affected | N/A |
DNS Server for SRM 1.3 | Not affected | N/A |
DNS Server for SRM 1.2 | Not affected | N/A |
Mitigation
None
Detail
CVE-2022-38177
- Severity: Not affected
- CVSS3 Base Score: 0.0
- CVSS3 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
- By spoofing the target resolver with responses that have a malformed ECDSA signature, an attacker can trigger a small memory leak. It is possible to gradually erode available memory to the point where named crashes for lack of resources.
CVE-2022-38178
- Severity: Not affected
- CVSS3 Base Score: 0.0
- CVSS3 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
- By spoofing the target resolver with responses that have a malformed EdDSA signature, an attacker can trigger a small memory leak. It is possible to gradually erode available memory to the point where named crashes for lack of resources.
CVE-2022-2906
- Severity: Not affected
- CVSS3 Base Score: 0.0
- CVSS3 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
- An attacker can leverage this flaw to gradually erode available memory to the point where named crashes for lack of resources. Upon restart the attacker would have to begin again, but nevertheless there is the potential to deny service.
CVE-2022-3080
- Severity: Not affected
- CVSS3 Base Score: 0.0
- CVSS3 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
- By sending specific queries to the resolver, an attacker can cause named to crash.
Reference
- ISC Releases Security Advisories for Multiple Versions of BIND 9
- CVE-2022-2906: Memory leaks in code handling Diffie-Hellman key exchange via TKEY RRs (OpenSSL 3.0.0+ only)
- CVE-2022-3080: BIND 9 resolvers configured to answer from stale cache with zero stale-answer-client-timeout may terminate unexpectedly
- CVE-2022-38177: Memory leak in ECDSA DNSSEC verification code
- CVE-2022-38178: Memory leaks in EdDSA DNSSEC verification code
- CVE-2022-2906
- CVE-2022-3080
- CVE-2022-38177
- CVE-2022-38178
Revision
Revision | Date | Description |
---|---|---|
1 | 2022-09-26 | Initial public release. |