Vulnerability Name: | CVE-2021-25218 (CCN-207768) | ||||||||||||||||||||||||||||||||
Assigned: | 2021-08-18 | ||||||||||||||||||||||||||||||||
Published: | 2021-08-18 | ||||||||||||||||||||||||||||||||
Updated: | 2021-09-16 | ||||||||||||||||||||||||||||||||
Summary: | In BIND 9.16.19, 9.17.16. Also, version 9.16.19-S1 of BIND Supported Preview Edition When a vulnerable version of named receives a query under the circumstances described above, the named process will terminate due to a failed assertion check. The vulnerability affects only BIND 9 releases 9.16.19, 9.17.16, and release 9.16.19-S1 of the BIND Supported Preview Edition. | ||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) 6.5 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
6.5 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
| ||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-617 | ||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Denial of Service | ||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2021-25218 Source: MLIST Type: Mailing List, Patch, Third Party Advisory [oss-security] 20210818 ISC has disclosed a vulnerability in BIND (CVE-2021-25218) Source: MLIST Type: Mailing List, Patch, Third Party Advisory [oss-security] 20210820 August BIND maintenance releases contain a defect affecting servers using the map zone file format (was: A vulnerability in BIND (CVE-2021-25218) will be announced 18 August 2021) Source: XF Type: UNKNOWN isc-bind-cve202125218-dos(207768) Source: CCN Type: ISC Web site CVE-2021-25218: A too-strict assertion check could be triggered when responses in BIND 9.16.19 and 9.17.16 require UDP fragmentation if RRL is in use Source: CONFIRM Type: Exploit, Vendor Advisory https://kb.isc.org/v1/docs/cve-2021-25218 Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2021-fbb258debf Source: CONFIRM Type: Third Party Advisory https://security.netapp.com/advisory/ntap-20210909-0002/ | ||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration CCN 1: ![]() | ||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||
BACK |