Vulnerability Description
DNSSEC validation is not performed correctly. An attacker can cause this package to report successful validation for invalid, attacker-controlled records. The owner name of RRSIG RRs is not validated, permitting an attacker to present the RRSIG for an attacker-controlled domain in a response for any other domain.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Go-Resolver Project | Go-Resolver | - |
Related Weaknesses (CWE)
References
- https://github.com/peterzen/goresolver/issues/5Issue TrackingThird Party Advisory
- https://pkg.go.dev/vuln/GO-2022-0979Vendor Advisory
- https://github.com/peterzen/goresolver/issues/5Issue TrackingThird Party Advisory
- https://pkg.go.dev/vuln/GO-2022-0979Vendor Advisory
FAQ
What is CVE-2022-3346?
CVE-2022-3346 is a vulnerability with a CVSS score of 6.5 (MEDIUM). DNSSEC validation is not performed correctly. An attacker can cause this package to report successful validation for invalid, attacker-controlled records. The owner name of RRSIG RRs is not validated,...
How severe is CVE-2022-3346?
CVE-2022-3346 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-3346?
Check the references section above for vendor advisories and patch information. Affected products include: Go-Resolver Project Go-Resolver.