Versio.io

CVE-2021-25219

Common vulnerabilities & exposures (CVE)

CVE databaseCVE database blogpostRelease & EoL database
 
Published at: - 27-10-2021 11:15
Last modified: - 25-04-2022 09:54
Total changes: - 5

Description

In BIND 9.3.0 -> 9.11.35, 9.12.0 -> 9.16.21, and versions 9.9.3-S1 -> 9.11.35-S1 and 9.16.8-S1 -> 9.16.21-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -> 9.17.18 of the BIND 9.17 development branch, exploitation of broken authoritative servers using a flaw in response processing can cause degradation in BIND resolver performance. The way the lame cache is currently designed makes it possible for its internal data structures to grow almost infinitely, which may cause significant delays in client query processing.

Common Vulnerability Scoring System (CVSS)

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Low
Attack complexity
Network
Attack vector
Low
Availability
None
Confidentiality
None
Integrity
None
Privileges required
Unchanged
Scope
None
User interaction
5.3
Base score
3.9
1.4
Exploitability score
Impact score
 

Verification logic

OR
OR
vendor=isc AND product=bind AND software_edition=- AND versionStartIncluding=9.3.0 AND versionEndExcluding=9.11.36
vendor=isc AND product=bind AND version=9.9.3 AND update=s1 AND software_edition=supported_preview
vendor=isc AND product=bind AND version=9.9.12 AND update=s1 AND software_edition=supported_preview
vendor=isc AND product=bind AND version=9.9.13 AND update=s1 AND software_edition=supported_preview
vendor=isc AND product=bind AND version=9.10.5 AND update=s1 AND software_edition=supported_preview
vendor=isc AND product=bind AND version=9.10.7 AND update=s1 AND software_edition=supported_preview
vendor=isc AND product=bind AND version=9.11.3 AND update=s1 AND software_edition=supported_preview
vendor=isc AND product=bind AND version=9.11.5 AND update=s3 AND software_edition=supported_preview
vendor=isc AND product=bind AND version=9.11.5 AND update=s5 AND software_edition=supported_preview
vendor=isc AND product=bind AND version=9.11.5 AND update=s6 AND software_edition=supported_preview
vendor=isc AND product=bind AND version=9.11.6 AND update=s1 AND software_edition=supported_preview
vendor=isc AND product=bind AND version=9.11.7 AND update=s1 AND software_edition=supported_preview
vendor=isc AND product=bind AND version=9.11.8 AND update=s1 AND software_edition=supported_preview
vendor=isc AND product=bind AND version=9.11.12 AND update=s1 AND software_edition=supported_preview
vendor=isc AND product=bind AND version=9.11.21 AND update=s1 AND software_edition=supported_preview
vendor=isc AND product=bind AND version=9.11.27 AND update=s1 AND software_edition=supported_preview
vendor=isc AND product=bind AND version=9.11.29 AND update=s1 AND software_edition=supported_preview
vendor=isc AND product=bind AND version=9.11.35 AND update=s1 AND software_edition=supported_preview
vendor=isc AND product=bind AND software_edition=- AND versionStartIncluding=9.12.0 AND versionEndExcluding=9.16.22
vendor=isc AND product=bind AND version=9.16.8 AND update=s1 AND software_edition=supported_preview
vendor=isc AND product=bind AND version=9.16.11 AND update=s1 AND software_edition=supported_preview
vendor=isc AND product=bind AND version=9.16.13 AND update=s1 AND software_edition=supported_preview
vendor=isc AND product=bind AND version=9.16.21 AND update=s1 AND software_edition=supported_preview
vendor=isc AND product=bind AND software_edition=- AND versionStartIncluding=9.17.0 AND versionEndExcluding=9.17.19
OR
vendor=Debian AND product=debian_linux AND version=9.0
vendor=Debian AND product=debian_linux AND version=10.0
vendor=Debian AND product=debian_linux AND version=11.0
OR
vendor=fedoraproject AND product=fedora AND version=33
vendor=fedoraproject AND product=fedora AND version=34
vendor=fedoraproject AND product=fedora AND version=35
AND
OR
vendor=netapp AND product=h300s_firmware AND version=-
OR
vendor=netapp AND product=h300s AND version=-
AND
OR
vendor=netapp AND product=h500s_firmware AND version=-
OR
vendor=netapp AND product=h500s AND version=-
AND
OR
vendor=netapp AND product=h700s_firmware AND version=-
OR
vendor=netapp AND product=h700s AND version=-
AND
OR
vendor=netapp AND product=h300e_firmware AND version=-
OR
vendor=netapp AND product=h300e AND version=-
AND
OR
vendor=netapp AND product=h500e_firmware AND version=-
OR
vendor=netapp AND product=h500e AND version=-
AND
OR
vendor=netapp AND product=h700e_firmware AND version=-
OR
vendor=netapp AND product=h700e AND version=-
AND
OR
vendor=netapp AND product=h410s_firmware AND version=-
OR
vendor=netapp AND product=h410s AND version=-
AND
OR
vendor=netapp AND product=h410c_firmware AND version=-
OR
vendor=netapp AND product=h410c AND version=-
OR
vendor=netapp AND product=cloud_backup AND version=-
OR
vendor=siemens AND product=sinec_infrastructure_network_services AND versionEndExcluding=1.0.1.1
OR
vendor=oracle AND product=http_server AND version=12.2.1.3.0
vendor=oracle AND product=http_server AND version=12.2.1.4.0
vendor=oracle AND product=zfs_storage_appliance_kit AND version=8.8
 

Reference

 


Keywords

NVD

 

CVE-2021-25219

 

CVE

 

Common vulnerabilities & exposures

 

CVSS

 

Common vulnerability scoring system

 

Security

 

Vulnerabilities

 

Exposures

 

We use cookies to ensure that we give you the best experience on our website. Read privacy policies for more information.