A broken inbound incremental zone update (IXFR) can cause named to terminate unexpectedly

CVE-2021-25214

6.5MEDIUM

Key Information

Vendor
Isc
Status
Bind9
Vendor
CVE Published:
29 April 2021

Badges

👾 Exploit Exists

Summary

In BIND 9.8.5 -> 9.8.8, 9.9.3 -> 9.11.29, 9.12.0 -> 9.16.13, and versions BIND 9.9.3-S1 -> 9.11.29-S1 and 9.16.8-S1 -> 9.16.13-S1 of BIND 9 Supported Preview Edition, as well as release versions 9.17.0 -> 9.17.11 of the BIND 9.17 development branch, when a vulnerable version of named receives a malformed IXFR triggering the flaw described above, the named process will terminate due to a failed assertion the next time the transferred secondary zone is refreshed.

Affected Version(s)

BIND9 = Open Source Branch 9.8 9.8.5 through 9.8.8

BIND9 = Open Source Branches 9.9 through 9.11 9.9.3 through versions before 9.11.30

BIND9 = Open Source Branches 9.12 through 9.16 9.12.0 through versions before 9.16.14

Refferences

CVSS V3.1

Score:
6.5
Severity:
MEDIUM
Confidentiality:
None
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • 👾

    Exploit exists.

  • Vulnerability published.

  • Vulnerability Reserved.

Collectors

NVD DatabaseMitre Database

Credit

ISC would like to thank Greg Kuechle of SaskTel for bringing this vulnerability to our attention.
.