CVE-2021-25215
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
29/04/2021
Last modified:
07/11/2023
Description
In BIND 9.0.0 -> 9.11.29, 9.12.0 -> 9.16.13, and versions BIND 9.9.3-S1 -> 9.11.29-S1 and 9.16.8-S1 -> 9.16.13-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -> 9.17.11 of the BIND 9.17 development branch, when a vulnerable version of named receives a query for a record triggering the flaw described above, the named process will terminate due to a failed assertion check. The vulnerability affects all currently maintained BIND 9 branches (9.11, 9.11-S, 9.16, 9.16-S, 9.17) as well as all other versions of BIND 9.
Impact
Base Score 3.x
7.50
Severity 3.x
HIGH
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:isc:bind:*:*:*:*:-:*:*:* | 9.0.0 (including) | 9.11.31 (excluding) |
| cpe:2.3:a:isc:bind:*:*:*:*:-:*:*:* | 9.12.0 (including) | 9.16.15 (excluding) |
| cpe:2.3:a:isc:bind:*:*:*:*:-:*:*:* | 9.17.0 (including) | 9.17.12 (excluding) |
| cpe:2.3:a:isc:bind:9.9.3:s1:*:*:supported_preview:*:*:* | ||
| cpe:2.3:a:isc:bind:9.9.12:s1:*:*:supported_preview:*:*:* | ||
| cpe:2.3:a:isc:bind:9.9.13:s1:*:*:supported_preview:*:*:* | ||
| cpe:2.3:a:isc:bind:9.10.5:s1:*:*:supported_preview:*:*:* | ||
| cpe:2.3:a:isc:bind:9.10.7:s1:*:*:supported_preview:*:*:* | ||
| cpe:2.3:a:isc:bind:9.11.3:s1:*:*:supported_preview:*:*:* | ||
| cpe:2.3:a:isc:bind:9.11.5:s3:*:*:supported_preview:*:*:* | ||
| cpe:2.3:a:isc:bind:9.11.5:s5:*:*:supported_preview:*:*:* | ||
| cpe:2.3:a:isc:bind:9.11.5:s6:*:*:supported_preview:*:*:* | ||
| cpe:2.3:a:isc:bind:9.11.6:s1:*:*:supported_preview:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://www.openwall.com/lists/oss-security/2021/04/29/1
- http://www.openwall.com/lists/oss-security/2021/04/29/2
- http://www.openwall.com/lists/oss-security/2021/04/29/3
- http://www.openwall.com/lists/oss-security/2021/04/29/4
- https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
- https://kb.isc.org/v1/docs/cve-2021-25215
- https://lists.debian.org/debian-lts-announce/2021/05/msg00001.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VEC2XG4Q2ODTN2C4CGXEIXU3EUTBMK7L/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZDSRPCJQ7MZC6CENH5PO3VQOFI7VSWBE/
- https://security.netapp.com/advisory/ntap-20210521-0006/
- https://www.debian.org/security/2021/dsa-4909
- https://www.oracle.com/security-alerts/cpuoct2021.html



