Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
CVE-2021-25214
CVE information
Published
Last Modified
CVSSv2.0 Severity
CVSSv3.1 Severity
Impact Analysis
Description
In BIND 9.8.5 -> 9.8.8, 9.9.3 -> 9.11.29, 9.12.0 -> 9.16.13, and versions BIND 9.9.3-S1 -> 9.11.29-S1 and 9.16.8-S1 -> 9.16.13-S1 of BIND 9 Supported Preview Edition, as well as release versions 9.17.0 -> 9.17.11 of the BIND 9.17 development branch, when a vulnerable version of named receives a malformed IXFR triggering the flaw described above, the named process will terminate due to a failed assertion the next time the transferred secondary zone is refreshed..
CVSSv2.0 Score
- Severity
- Medium
- Base Score
- 4/10
- Exploit Score
- 8/10
- Access Vector
- Network
- Access Complexity
- Low
- Authentication Required
- Single
- Impact Score
- 2.9/10
- Confidentiality Impact
- None
- Availability Impact
- Partial
- Integrity Impact
- None
CVSSv3.1 Score
- Severity
- Medium
- Base Score
- 6.5/10
- Exploit Score
- 2.8/10
- Access Vector
- Network
- Access Complexity
- Low
- Privileges Required
- Low
- Impact Score
- 3.6/10
- Confidentiality Impact
- None
- Availability Impact
- High
- Integrity Impact
- None
- Scope
- Unchanged
- User Interaction
- None
Products Affected
CPE | Affected | Vulnerable | Excluding | Edit |
---|---|---|---|---|
cpe:2.3:a:isc:bind:9.11.7:s1:*:*:supported_preview:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:isc:bind:9.11.3:s1:*:*:supported_preview:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:isc:bind:9.11.6:s1:*:*:supported_preview:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:isc:bind:9.10.5:s1:*:*:supported_preview:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:isc:bind:9.11.5:s5:*:*:supported_preview:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:isc:bind:9.11.5:s3:*:*:supported_preview:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:isc:bind:9.9.3:s1:*:*:supported_preview:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:isc:bind:9.10.7:s1:*:*:supported_preview:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:isc:bind:9.11.5:s6:*:*:supported_preview:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:isc:bind:9.11.12:s1:*:*:supported_preview:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:isc:bind:9.11.8:s1:*:*:supported_preview:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:isc:bind:9.9.12:s1:*:*:supported_preview:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:isc:bind:9.9.13:s1:*:*:supported_preview:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:isc:bind:9.11.21:s1:*:*:supported_preview:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:isc:bind:9.16.8:s1:*:*:supported_preview:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:isc:bind:9.16.11:s1:*:*:supported_preview:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:isc:bind:9.11.27:s1:*:*:supported_preview:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:isc:bind:9.16.13:s1:*:*:supported_preview:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:isc:bind:9.11.29:s1:*:*:supported_preview:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:isc:bind:*:*:*:*:-:*:*:* |
Yes
|
9.8.5 | - | |
cpe:2.3:a:isc:bind:*:*:*:*:-:*:*:* |
Yes
|
9.9.3 | 9.11.31 | |
cpe:2.3:a:isc:bind:*:*:*:*:-:*:*:* |
Yes
|
9.12.0 | 9.16.15 | |
cpe:2.3:a:isc:bind:*:*:*:*:-:*:*:* |
Yes
|
9.17.0 | 9.17.12 | |
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:siemens:sinec_infrastructure_network_services:*:*: |
Yes
|
- | 1.0.1.1 | |
cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vsphere |
Yes
|
- | - |
References
- https://kb.isc.org/v1/docs/cve-2021-25214
- http://www.openwall.com/lists/oss-security/2021/04/29/1
- http://www.openwall.com/lists/oss-security/2021/04/29/2
- http://www.openwall.com/lists/oss-security/2021/04/29/3
- http://www.openwall.com/lists/oss-security/2021/04/29/4
- https://www.debian.org/security/2021/dsa-4909
- https://lists.debian.org/debian-lts-announce/2021/05/msg00001.html
- https://security.netapp.com/advisory/ntap-20210521-0006/
- https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org