Resource management error in MaraDNS - CVE-2022-30256
Published: June 30, 2023
Vulnerability identifier: #VU77839
CSH Severity: Medium
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2022-30256
CWE-ID: CWE-399
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vulnerable software:
MaraDNS
MaraDNS
Software vendor:
Sam Trenholme
Sam Trenholme
Description
The vulnerability allows a remote attacker to bypass expected security restrictions.
The vulnerability exists due to the way MaraDNS handles cached domain names. A revoked domain name can still be resolvable for a long time, including expired domains and taken-down malicious domains.
Remediation
Install updates from vendor's website.
External links
- https://maradns.samiam.org/
- https://maradns.samiam.org/security.html#CVE-2022-30256
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3VSMLJX25MXGQ6A7UPOGK7VPUVDESPHL/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NB7LDZM5AGWC5BHHQHW6CP5OFNBBKFOQ/
- https://lists.debian.org/debian-lts-announce/2023/06/msg00019.html
- https://www.debian.org/security/2023/dsa-5441