A broken inbound incremental zone update (IXFR) can cause named to terminate unexpectedly
CVE-2021-25214
6.5MEDIUM
Summary
In BIND 9.8.5 -> 9.8.8, 9.9.3 -> 9.11.29, 9.12.0 -> 9.16.13, and versions BIND 9.9.3-S1 -> 9.11.29-S1 and 9.16.8-S1 -> 9.16.13-S1 of BIND 9 Supported Preview Edition, as well as release versions 9.17.0 -> 9.17.11 of the BIND 9.17 development branch, when a vulnerable version of named receives a malformed IXFR triggering the flaw described above, the named process will terminate due to a failed assertion the next time the transferred secondary zone is refreshed.
Affected Version(s)
BIND9 = Open Source Branch 9.8 9.8.5 through 9.8.8
BIND9 = Open Source Branches 9.9 through 9.11 9.9.3 through versions before 9.11.30
BIND9 = Open Source Branches 9.12 through 9.16 9.12.0 through versions before 9.16.14
Refferences
https://kb.isc.org/v1/docs/cve-2021-25214
x_refsource_CONFIRM
http://www.openwall.com/lists/oss-security/2021/04/29/1
mailing-listx_refsource_MLIST
http://www.openwall.com/lists/oss-security/2021/04/29/2
mailing-listx_refsource_MLIST
http://www.openwall.com/lists/oss-security/2021/04/29/3
mailing-listx_refsource_MLIST
http://www.openwall.com/lists/oss-security/2021/04/29/4
mailing-listx_refsource_MLIST
https://www.debian.org/security/2021/dsa-4909
vendor-advisoryx_refsource_DEBIAN
https://lists.debian.org/debian-lts-announce/2021/05/msg0...
mailing-listx_refsource_MLIST
https://lists.fedoraproject.org/archives/list/package-ann...
vendor-advisoryx_refsource_FEDORA
https://lists.fedoraproject.org/archives/list/package-ann...
vendor-advisoryx_refsource_FEDORA
https://security.netapp.com/advisory/ntap-20210521-0006/
x_refsource_CONFIRM
https://cert-portal.siemens.com/productcert/pdf/ssa-38929...
x_refsource_CONFIRM
CVSS V3.1
Score:
6.5
Severity:
MEDIUM
Confidentiality:
None
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
- 👾
Exploit exists.
Vulnerability published.
Vulnerability Reserved.
Collectors
NVD DatabaseMitre Database
Credit
ISC would like to thank Greg Kuechle of SaskTel for bringing this vulnerability to our attention.