CVE-2022-3080

By sending specific queries to the resolver, an attacker can cause named to crash.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:isc:bind:*:*:*:*:-:*:*:*
cpe:2.3:a:isc:bind:*:*:*:*:-:*:*:*
cpe:2.3:a:isc:bind:*:*:*:*:-:*:*:*
cpe:2.3:a:isc:bind:9.16.14:s1:*:*:supported_preview:*:*:*
cpe:2.3:a:isc:bind:9.16.21:s1:*:*:supported_preview:*:*:*
cpe:2.3:a:isc:bind:9.16.32:s1:*:*:supported_preview:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*

History

21 Nov 2024, 07:18

Type Values Removed Values Added
References () http://www.openwall.com/lists/oss-security/2022/09/21/3 - Mailing List, Patch, Third Party Advisory () http://www.openwall.com/lists/oss-security/2022/09/21/3 - Mailing List, Patch, Third Party Advisory
References () https://kb.isc.org/docs/cve-2022-3080 - Patch, Vendor Advisory () https://kb.isc.org/docs/cve-2022-3080 - Patch, Vendor Advisory
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CV4GQWBPF7Y52J2FA24U6UMHQAOXZEF7/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CV4GQWBPF7Y52J2FA24U6UMHQAOXZEF7/ -
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MRHB6J4Z7BKH4HPEKG5D35QGRD6ANNMT/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MRHB6J4Z7BKH4HPEKG5D35QGRD6ANNMT/ -
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZJQNUASODNVAWZV6STKG5SD6XIJ446S/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZJQNUASODNVAWZV6STKG5SD6XIJ446S/ -
References () https://security.gentoo.org/glsa/202210-25 - Third Party Advisory () https://security.gentoo.org/glsa/202210-25 - Third Party Advisory
References () https://security.netapp.com/advisory/ntap-20240621-0002/ - () https://security.netapp.com/advisory/ntap-20240621-0002/ -
References () https://www.debian.org/security/2022/dsa-5235 - Third Party Advisory () https://www.debian.org/security/2022/dsa-5235 - Third Party Advisory

03 Jul 2024, 01:38

Type Values Removed Values Added
CWE CWE-613

21 Jun 2024, 19:15

Type Values Removed Values Added
References
  • () https://security.netapp.com/advisory/ntap-20240621-0002/ -

08 Aug 2023, 14:22

Type Values Removed Values Added
CWE CWE-74 NVD-CWE-noinfo

03 Dec 2022, 01:05

Type Values Removed Values Added
References (GENTOO) https://security.gentoo.org/glsa/202210-25 - (GENTOO) https://security.gentoo.org/glsa/202210-25 - Third Party Advisory

31 Oct 2022, 04:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-09-21 11:15

Updated : 2024-11-21 07:18


NVD link : CVE-2022-3080

Mitre link : CVE-2022-3080

CVE.ORG link : CVE-2022-3080


JSON object : View

Products Affected

isc

  • bind

fedoraproject

  • fedora
CWE
NVD-CWE-noinfo CWE-613

Insufficient Session Expiration