By spoofing the target resolver with responses that have a malformed EdDSA signature, an attacker can trigger a small memory leak. It is possible to gradually erode available memory to the point where named crashes for lack of resources.
2022-09-21T11:15:09.733
2025-05-28T16:15:26.723
Modified
CVSSv3.1: 7.5 (HIGH)
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | isc | bind | ≤ 9.9.13 | Yes |
Application | isc | bind | ≤ 9.10.8 | Yes |
Application | isc | bind | ≤ 9.16.32 | Yes |
Application | isc | bind | 9.11.3 | Yes |
Application | isc | bind | 9.11.3 | Yes |
Application | isc | bind | 9.11.5 | Yes |
Application | isc | bind | 9.11.5 | Yes |
Application | isc | bind | 9.11.5 | Yes |
Application | isc | bind | 9.11.5 | Yes |
Application | isc | bind | 9.11.6 | Yes |
Application | isc | bind | 9.11.7 | Yes |
Application | isc | bind | 9.11.8 | Yes |
Application | isc | bind | 9.11.12 | Yes |
Application | isc | bind | 9.11.14-s1 | Yes |
Application | isc | bind | 9.11.19-s1 | Yes |
Application | isc | bind | 9.11.21 | Yes |
Application | isc | bind | 9.11.27 | Yes |
Application | isc | bind | 9.11.29 | Yes |
Application | isc | bind | 9.11.35 | Yes |
Application | isc | bind | 9.11.37 | Yes |
Application | isc | bind | 9.16.8 | Yes |
Application | isc | bind | 9.16.11 | Yes |
Application | isc | bind | 9.16.13 | Yes |
Application | isc | bind | 9.16.21 | Yes |
Application | isc | bind | 9.16.32 | Yes |
Operating System | debian | debian_linux | 11.0 | Yes |
Operating System | fedoraproject | fedora | 35 | Yes |
Operating System | fedoraproject | fedora | 36 | Yes |
Operating System | fedoraproject | fedora | 37 | Yes |
Application | netapp | active_iq_unified_manager | - | Yes |