Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2021-25215

Опубликовано: 28 апр. 2021
Источник: redhat
CVSS3: 7.5

Описание

In BIND 9.0.0 -> 9.11.29, 9.12.0 -> 9.16.13, and versions BIND 9.9.3-S1 -> 9.11.29-S1 and 9.16.8-S1 -> 9.16.13-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -> 9.17.11 of the BIND 9.17 development branch, when a vulnerable version of named receives a query for a record triggering the flaw described above, the named process will terminate due to a failed assertion check. The vulnerability affects all currently maintained BIND 9 branches (9.11, 9.11-S, 9.16, 9.16-S, 9.17) as well as all other versions of BIND 9.

A flaw was found in bind. The way DNAME records are processed may trigger the same RRset to the ANSWER section to be added more than once which causes an assertion check to fail. The highest threat from this flaw is to system availability.

Меры по смягчению последствий

Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5bindOut of support scope
Red Hat Enterprise Linux 5bind97Out of support scope
Red Hat Enterprise Linux 9bindNot affected
Red Hat Enterprise Linux 6 Extended Lifecycle SupportbindFixedRHSA-2021:146829.04.2021
Red Hat Enterprise Linux 7bindFixedRHSA-2021:146929.04.2021
Red Hat Enterprise Linux 7.2 Advanced Update SupportbindFixedRHSA-2021:147603.05.2021
Red Hat Enterprise Linux 7.3 Advanced Update SupportbindFixedRHSA-2021:147503.05.2021
Red Hat Enterprise Linux 7.4 Advanced Update SupportbindFixedRHSA-2021:147903.05.2021
Red Hat Enterprise Linux 7.4 Telco Extended Update SupportbindFixedRHSA-2021:147903.05.2021
Red Hat Enterprise Linux 7.4 Update Services for SAP SolutionsbindFixedRHSA-2021:147903.05.2021

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-617
https://bugzilla.redhat.com/show_bug.cgi?id=1953857bind: An assertion check can fail while answering queries for DNAME records that require the DNAME to be processed to resolve itself

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
около 4 лет назад

In BIND 9.0.0 -> 9.11.29, 9.12.0 -> 9.16.13, and versions BIND 9.9.3-S1 -> 9.11.29-S1 and 9.16.8-S1 -> 9.16.13-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -> 9.17.11 of the BIND 9.17 development branch, when a vulnerable version of named receives a query for a record triggering the flaw described above, the named process will terminate due to a failed assertion check. The vulnerability affects all currently maintained BIND 9 branches (9.11, 9.11-S, 9.16, 9.16-S, 9.17) as well as all other versions of BIND 9.

CVSS3: 7.5
nvd
около 4 лет назад

In BIND 9.0.0 -> 9.11.29, 9.12.0 -> 9.16.13, and versions BIND 9.9.3-S1 -> 9.11.29-S1 and 9.16.8-S1 -> 9.16.13-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -> 9.17.11 of the BIND 9.17 development branch, when a vulnerable version of named receives a query for a record triggering the flaw described above, the named process will terminate due to a failed assertion check. The vulnerability affects all currently maintained BIND 9 branches (9.11, 9.11-S, 9.16, 9.16-S, 9.17) as well as all other versions of BIND 9.

CVSS3: 7.5
msrc
около 4 лет назад

Описание отсутствует

CVSS3: 7.5
debian
около 4 лет назад

In BIND 9.0.0 -> 9.11.29, 9.12.0 -> 9.16.13, and versions BIND 9.9.3-S ...

rocky
почти 4 года назад

Important: bind security update

7.5 High

CVSS3