CVE-2022-30256

See a problem?
Source
https://nvd.nist.gov/vuln/detail/CVE-2022-30256
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-30256.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-30256
Related
Published
2022-11-19T00:15:10Z
Modified
2024-09-18T03:17:56.426875Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N CVSS Calculator
Summary
[none]
Details

An issue was discovered in MaraDNS Deadwood through 3.5.0021 that allows variant V1 of unintended domain name resolution. A revoked domain name can still be resolvable for a long time, including expired domains and taken-down malicious domains. The effects of an exploit would be widespread and highly impactful, because the exploitation conforms to de facto DNS specifications and operational practices, and overcomes current mitigation patches for "Ghost" domain names.

References

Affected packages

Debian:11 / maradns

Package

Name
maradns
Purl
pkg:deb/debian/maradns?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.0.13-1.4+deb11u1

Affected versions

2.*

2.0.13-1.4

Ecosystem specific

{
    "urgency": "not yet assigned"
}