Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2021-25220

Опубликовано: 16 мар. 2022
Источник: redhat
CVSS3: 6.8

Описание

BIND 9.11.0 -> 9.11.36 9.12.0 -> 9.16.26 9.17.0 -> 9.18.0 BIND Supported Preview Editions: 9.11.4-S1 -> 9.11.36-S1 9.16.8-S1 -> 9.16.26-S1 Versions of BIND 9 earlier than those shown - back to 9.1.0, including Supported Preview Editions - are also believed to be affected but have not been tested as they are EOL. The cache could become poisoned with incorrect records leading to queries being made to the wrong servers, which might also result in false information being returned to clients.

A cache poisoning vulnerability was found in BIND when using forwarders. Bogus NS records supplied by the forwarders may be cached and used by name if it needs to recurse for any reason. This issue causes it to obtain and pass on potentially incorrect answers. This flaw allows a remote high privileged attacker to manipulate cache results with incorrect records, leading to queries made to the wrong servers, possibly resulting in false information received on the client's end.

Отчет

Versions of BIND shipped with Red Hat Enterprise Linux 8, 9 are affected, because vulnerable code is present in our code base. For RHEL-9, DHCP uses the vulnerable BIND 9 libraries (bind-9.11.14) for some services. Hence, it is affected as well. Authoritative - Only BIND 9 servers are not vulnerable to this flaw.

Меры по смягчению последствий

If applicable, modify your configuration to either remove all forwarding or all possibility of recursion. Depending on your use case, it may be possible to use other zone types to replace forward zones.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6bindOut of support scope
Red Hat Enterprise Linux 7bindFixedRHSA-2023:040224.01.2023
Red Hat Enterprise Linux 8bind9.16FixedRHSA-2022:764308.11.2022
Red Hat Enterprise Linux 8bindFixedRHSA-2022:779008.11.2022
Red Hat Enterprise Linux 8bindFixedRHSA-2022:779008.11.2022
Red Hat Enterprise Linux 8.6 Extended Update SupportbindFixedRHSA-2024:272007.05.2024
Red Hat Enterprise Linux 8.6 Extended Update SupportdhcpFixedRHSA-2024:272007.05.2024
Red Hat Enterprise Linux 9bindFixedRHSA-2022:806815.11.2022
Red Hat Enterprise Linux 9dhcpFixedRHSA-2022:838515.11.2022

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-444
https://bugzilla.redhat.com/show_bug.cgi?id=2064512bind: DNS forwarders - cache poisoning vulnerability

6.8 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.8
ubuntu
около 3 лет назад

BIND 9.11.0 -> 9.11.36 9.12.0 -> 9.16.26 9.17.0 -> 9.18.0 BIND Supported Preview Editions: 9.11.4-S1 -> 9.11.36-S1 9.16.8-S1 -> 9.16.26-S1 Versions of BIND 9 earlier than those shown - back to 9.1.0, including Supported Preview Editions - are also believed to be affected but have not been tested as they are EOL. The cache could become poisoned with incorrect records leading to queries being made to the wrong servers, which might also result in false information being returned to clients.

CVSS3: 6.8
nvd
около 3 лет назад

BIND 9.11.0 -> 9.11.36 9.12.0 -> 9.16.26 9.17.0 -> 9.18.0 BIND Supported Preview Editions: 9.11.4-S1 -> 9.11.36-S1 9.16.8-S1 -> 9.16.26-S1 Versions of BIND 9 earlier than those shown - back to 9.1.0, including Supported Preview Editions - are also believed to be affected but have not been tested as they are EOL. The cache could become poisoned with incorrect records leading to queries being made to the wrong servers, which might also result in false information being returned to clients.

CVSS3: 6.8
msrc
около 3 лет назад

Описание отсутствует

CVSS3: 6.8
debian
около 3 лет назад

BIND 9.11.0 -> 9.11.36 9.12.0 -> 9.16.26 9.17.0 -> 9.18.0 BIND Support ...

suse-cvrf
около 3 лет назад

Security update for bind

6.8 Medium

CVSS3