{"api_version":"1","generated_at":"2026-04-22T22:48:12+00:00","cve":"CVE-2021-25219","urls":{"html":"https://cve.report/CVE-2021-25219","api":"https://cve.report/api/cve/CVE-2021-25219.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2021-25219","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2021-25219"},"summary":{"title":"CVE-2021-25219","description":"In BIND 9.3.0 -> 9.11.35, 9.12.0 -> 9.16.21, and versions 9.9.3-S1 -> 9.11.35-S1 and 9.16.8-S1 -> 9.16.21-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -> 9.17.18 of the BIND 9.17 development branch, exploitation of broken authoritative servers using a flaw in response processing can cause degradation in BIND resolver performance. The way the lame cache is currently designed makes it possible for its internal data structures to grow almost infinitely, which may cause significant delays in client query processing.","state":"PUBLIC","assigner":"security-officer@isc.org","published_at":"2021-10-27 21:15:00","updated_at":"2023-11-07 03:31:00"},"problem_types":["NVD-CWE-noinfo"],"metrics":[],"references":[{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YGV7SA27CTYLGFJSPUM3V36ZWK7WWDI4/","name":"FEDORA-2021-39b33260b8","refsource":"FEDORA","tags":[],"title":"[SECURITY] Fedora 34 Update: bind-9.16.22-1.fc34 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://security.netapp.com/advisory/ntap-20211118-0002/","name":"https://security.netapp.com/advisory/ntap-20211118-0002/","refsource":"CONFIRM","tags":[],"title":"CVE-2021-25219 ISC BIND Vulnerability in NetApp Products | NetApp Product Security","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EF4NAVRV4H3W4GA3LGGZYUKD3HSJBAVW/","name":"FEDORA-2021-eb8dab50ba","refsource":"","tags":[],"title":"[SECURITY] Fedora 33 Update: bind-9.11.36-1.fc33 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.oracle.com/security-alerts/cpuapr2022.html","name":"https://www.oracle.com/security-alerts/cpuapr2022.html","refsource":"MISC","tags":[],"title":"Oracle Critical Patch Update Advisory - April 2022","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTKC4E3HUOLYN5IA4EBL4VAQSWG2ZVTX/","name":"FEDORA-2021-58e7b873b7","refsource":"","tags":[],"title":"[SECURITY] Fedora 35 Update: bind-9.16.22-1.fc35 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://security.gentoo.org/glsa/202210-25","name":"GLSA-202210-25","refsource":"GENTOO","tags":[],"title":"ISC BIND: Multiple Vulnerabilities (GLSA 202210-25) — Gentoo security","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YGV7SA27CTYLGFJSPUM3V36ZWK7WWDI4/","name":"FEDORA-2021-39b33260b8","refsource":"","tags":[],"title":"[SECURITY] Fedora 34 Update: bind-9.16.22-1.fc34 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YTKC4E3HUOLYN5IA4EBL4VAQSWG2ZVTX/","name":"FEDORA-2021-58e7b873b7","refsource":"FEDORA","tags":[],"title":"[SECURITY] Fedora 35 Update: bind-9.16.22-1.fc35 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EF4NAVRV4H3W4GA3LGGZYUKD3HSJBAVW/","name":"FEDORA-2021-eb8dab50ba","refsource":"FEDORA","tags":[],"title":"[SECURITY] Fedora 33 Update: bind-9.11.36-1.fc33 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf","name":"https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf","refsource":"CONFIRM","tags":[],"title":"","mime":"application/pdf","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.debian.org/debian-lts-announce/2021/11/msg00001.html","name":"[debian-lts-announce] 20211102 [SECURITY] [DLA 2807-1] bind9 security update","refsource":"MLIST","tags":[],"title":"[SECURITY] [DLA 2807-1] bind9 security update","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://kb.isc.org/v1/docs/cve-2021-25219","name":"https://kb.isc.org/v1/docs/cve-2021-25219","refsource":"CONFIRM","tags":[],"title":"CVE-2021-25219: Lame cache can be abused to severely degrade resolver performance - Security Advisories","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.debian.org/security/2021/dsa-4994","name":"DSA-4994","refsource":"DEBIAN","tags":[],"title":"Debian -- Security Information -- DSA-4994-1 bind9","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2021-25219","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-25219","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[{"source":"LEGACY","value":"ISC would like to thank Kishore Kumar Kothapalli of Infoblox for bringing this vulnerability to our attention.","lang":""}],"nvd_cpes":[{"cve_year":"2021","cve_id":"25219","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"10.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"25219","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"11.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"25219","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"9.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"25219","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"fedoraproject","cpe5":"fedora","cpe6":"33","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"25219","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"fedoraproject","cpe5":"fedora","cpe6":"34","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"25219","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"fedoraproject","cpe5":"fedora","cpe6":"35","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"25219","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"isc","cpe5":"bind","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"-","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"25219","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"isc","cpe5":"bind","cpe6":"9.10.5","cpe7":"s1","cpe8":"*","cpe9":"*","cpe10":"supported_preview","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"25219","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"isc","cpe5":"bind","cpe6":"9.10.7","cpe7":"s1","cpe8":"*","cpe9":"*","cpe10":"supported_preview","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"25219","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"isc","cpe5":"bind","cpe6":"9.11.12","cpe7":"s1","cpe8":"*","cpe9":"*","cpe10":"supported_preview","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"25219","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"isc","cpe5":"bind","cpe6":"9.11.21","cpe7":"s1","cpe8":"*","cpe9":"*","cpe10":"supported_preview","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"25219","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"isc","cpe5":"bind","cpe6":"9.11.27","cpe7":"s1","cpe8":"*","cpe9":"*","cpe10":"supported_preview","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"25219","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"isc","cpe5":"bind","cpe6":"9.11.29","cpe7":"s1","cpe8":"*","cpe9":"*","cpe10":"supported_preview","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"25219","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"isc","cpe5":"bind","cpe6":"9.11.3","cpe7":"s1","cpe8":"*","cpe9":"*","cpe10":"supported_preview","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"25219","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"isc","cpe5":"bind","cpe6":"9.11.35","cpe7":"s1","cpe8":"*","cpe9":"*","cpe10":"supported_preview","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"25219","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"isc","cpe5":"bind","cpe6":"9.11.5","cpe7":"s3","cpe8":"*","cpe9":"*","cpe10":"supported_preview","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"25219","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"isc","cpe5":"bind","cpe6":"9.11.5","cpe7":"s5","cpe8":"*","cpe9":"*","cpe10":"supported_preview","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"25219","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"isc","cpe5":"bind","cpe6":"9.11.5","cpe7":"s6","cpe8":"*","cpe9":"*","cpe10":"supported_preview","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"25219","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"isc","cpe5":"bind","cpe6":"9.11.6","cpe7":"s1","cpe8":"*","cpe9":"*","cpe10":"supported_preview","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"25219","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"isc","cpe5":"bind","cpe6":"9.11.7","cpe7":"s1","cpe8":"*","cpe9":"*","cpe10":"supported_preview","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"25219","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"isc","cpe5":"bind","cpe6":"9.11.8","cpe7":"s1","cpe8":"*","cpe9":"*","cpe10":"supported_preview","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"25219","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"isc","cpe5":"bind","cpe6":"9.16.11","cpe7":"s1","cpe8":"*","cpe9":"*","cpe10":"supported_preview","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"25219","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"isc","cpe5":"bind","cpe6":"9.16.13","cpe7":"s1","cpe8":"*","cpe9":"*","cpe10":"supported_preview","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"25219","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"isc","cpe5":"bind","cpe6":"9.16.21","cpe7":"s1","cpe8":"*","cpe9":"*","cpe10":"supported_preview","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"25219","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"isc","cpe5":"bind","cpe6":"9.16.8","cpe7":"s1","cpe8":"*","cpe9":"*","cpe10":"supported_preview","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"25219","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"isc","cpe5":"bind","cpe6":"9.9.12","cpe7":"s1","cpe8":"*","cpe9":"*","cpe10":"supported_preview","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"25219","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"isc","cpe5":"bind","cpe6":"9.9.13","cpe7":"s1","cpe8":"*","cpe9":"*","cpe10":"supported_preview","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"25219","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"isc","cpe5":"bind","cpe6":"9.9.3","cpe7":"s1","cpe8":"*","cpe9":"*","cpe10":"supported_preview","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"25219","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"netapp","cpe5":"cloud_backup","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"25219","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"netapp","cpe5":"h300e","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"25219","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"netapp","cpe5":"h300e_firmware","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"25219","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"netapp","cpe5":"h300s","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"25219","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"netapp","cpe5":"h300s_firmware","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"25219","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"netapp","cpe5":"h410c","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"25219","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"netapp","cpe5":"h410c_firmware","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"25219","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"netapp","cpe5":"h410s","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"25219","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"netapp","cpe5":"h410s_firmware","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"25219","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"netapp","cpe5":"h500e","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"25219","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"netapp","cpe5":"h500e_firmware","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"25219","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"netapp","cpe5":"h500s","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"25219","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"netapp","cpe5":"h500s_firmware","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"25219","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"netapp","cpe5":"h700e","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"25219","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"netapp","cpe5":"h700e_firmware","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"25219","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"netapp","cpe5":"h700s","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"25219","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"netapp","cpe5":"h700s_firmware","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"25219","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"http_server","cpe6":"12.2.1.3.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"25219","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"http_server","cpe6":"12.2.1.4.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"25219","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"zfs_storage_appliance_kit","cpe6":"8.8","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"25219","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"siemens","cpe5":"sinec_infrastructure_network_services","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2021-25219","qid":"15128","title":"ISC BIND Lame cache Vulnerability"},{"cve":"CVE-2021-25219","qid":"159815","title":"Oracle Enterprise Linux Security Update for bind (ELSA-2022-2092)"},{"cve":"CVE-2021-25219","qid":"178855","title":"Debian Security Update for bind9 (DSA 4994-1)"},{"cve":"CVE-2021-25219","qid":"178863","title":"Debian Security Update for bind9 (DLA 2807-1)"},{"cve":"CVE-2021-25219","qid":"183695","title":"Debian Security Update for bind9 (CVE-2021-25219)"},{"cve":"CVE-2021-25219","qid":"198558","title":"Ubuntu Security Notification for Bind Vulnerability (USN-5126-1)"},{"cve":"CVE-2021-25219","qid":"240291","title":"Red Hat Update for bind security (RHSA-2022:2092)"},{"cve":"CVE-2021-25219","qid":"282051","title":"Fedora Security Update for bind (FEDORA-2021-eb8dab50ba)"},{"cve":"CVE-2021-25219","qid":"282052","title":"Fedora Security Update for bind (FEDORA-2021-39b33260b8)"},{"cve":"CVE-2021-25219","qid":"296066","title":"Oracle Solaris 11.4 Support Repository Update (SRU) 40.107.3 Missing (CPUOCT2021)"},{"cve":"CVE-2021-25219","qid":"330098","title":"IBM AIX BIND Denial of Service (DoS) Vulnerability (bind_advisory20)"},{"cve":"CVE-2021-25219","qid":"376031","title":"F5 BIG-IP Application Security Manager (ASM), Local Traffic Manager (LTM), Access Policy Manager (APM) BIND Vulnerability (K77326807)"},{"cve":"CVE-2021-25219","qid":"376049","title":"F5 BIG-IP Application Security Manager (ASM), Local Traffic Manager (LTM), Access Policy Manager (APM) BIND Vulnerability (K77326807)"},{"cve":"CVE-2021-25219","qid":"500062","title":"Alpine Linux Security Update for bind"},{"cve":"CVE-2021-25219","qid":"501382","title":"Alpine Linux Security Update for bind"},{"cve":"CVE-2021-25219","qid":"501948","title":"Alpine Linux Security Update for bind"},{"cve":"CVE-2021-25219","qid":"503871","title":"Alpine Linux Security Update for bind"},{"cve":"CVE-2021-25219","qid":"671192","title":"EulerOS Security Update for bind (EulerOS-SA-2022-1001)"},{"cve":"CVE-2021-25219","qid":"671208","title":"EulerOS Security Update for bind (EulerOS-SA-2022-1021)"},{"cve":"CVE-2021-25219","qid":"671307","title":"EulerOS Security Update for bind (EulerOS-SA-2022-1237)"},{"cve":"CVE-2021-25219","qid":"671324","title":"EulerOS Security Update for bind (EulerOS-SA-2022-1249)"},{"cve":"CVE-2021-25219","qid":"671356","title":"EulerOS Security Update for bind (EulerOS-SA-2022-1261)"},{"cve":"CVE-2021-25219","qid":"671663","title":"EulerOS Security Update for bind (EulerOS-SA-2022-1705)"},{"cve":"CVE-2021-25219","qid":"672329","title":"EulerOS Security Update for dhcp (EulerOS-SA-2022-2759)"},{"cve":"CVE-2021-25219","qid":"672358","title":"EulerOS Security Update for dhcp (EulerOS-SA-2022-2724)"},{"cve":"CVE-2021-25219","qid":"672424","title":"EulerOS Security Update for dhcp (EulerOS-SA-2022-2842)"},{"cve":"CVE-2021-25219","qid":"672461","title":"EulerOS Security Update for dhcp (EulerOS-SA-2022-2817)"},{"cve":"CVE-2021-25219","qid":"672477","title":"EulerOS Security Update for dhcp (EulerOS-SA-2023-1032)"},{"cve":"CVE-2021-25219","qid":"672510","title":"EulerOS Security Update for dhcp (EulerOS-SA-2023-1007)"},{"cve":"CVE-2021-25219","qid":"710661","title":"Gentoo Linux ISC BIND Multiple Vulnerabilities (GLSA 202210-25)"},{"cve":"CVE-2021-25219","qid":"751363","title":"SUSE Enterprise Linux Security Update for bind (SUSE-SU-2021:3657-1)"},{"cve":"CVE-2021-25219","qid":"751396","title":"OpenSUSE Security Update for bind (openSUSE-SU-2021:3773-1)"},{"cve":"CVE-2021-25219","qid":"751400","title":"OpenSUSE Security Update for bind (openSUSE-SU-2021:1502-1)"},{"cve":"CVE-2021-25219","qid":"751635","title":"OpenSUSE Security Update for bind (openSUSE-SU-2022:0151-1)"},{"cve":"CVE-2021-25219","qid":"751980","title":"SUSE Enterprise Linux Security Update for bind (SUSE-SU-2022:0151-1)"},{"cve":"CVE-2021-25219","qid":"752457","title":"SUSE Enterprise Linux Security Update for bind (SUSE-SU-2022:2713-1)"},{"cve":"CVE-2021-25219","qid":"901647","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for bind (6327)"},{"cve":"CVE-2021-25219","qid":"902239","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for bind (6327-1)"},{"cve":"CVE-2021-25219","qid":"940543","title":"AlmaLinux Security Update for bind (ALSA-2022:2092)"},{"cve":"CVE-2021-25219","qid":"960283","title":"Rocky Linux Security Update for bind (RLSA-2022:2092)"}]},"source_records":{"cve_program":{"data_type":"CVE","data_format":"MITRE","data_version":"4.0","CVE_data_meta":{"DATE_PUBLIC":"2021-10-27T20:10:02.000Z","ID":"CVE-2021-25219","ASSIGNER":"security-officer@isc.org","STATE":"PUBLIC","TITLE":"Lame cache can be abused to severely degrade resolver performance"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"BIND9","version":{"version_data":[{"version_name":"Open Source Branches 9.3 through 9.11","version_value":"9.3.0 through versions before 9.11.36"},{"version_name":"Open Source Branches 9.12 through 9.16","version_value":"9.12.0 through versions before 9.16.22"},{"version_name":"Supported Preview Branches 9.9-S through 9.11-S","version_value":"9.9.3-S1 through versions before 9.11.36-S1"},{"version_name":"Supported Preview Branch 9.16-S","version_value":"9.16.8-S1 through versions before 9.16.22-S1"},{"version_name":"Development Branch 9.17","version_value":"9.17.0 through versions before 9.17.19"}]}}]},"vendor_name":"ISC"}]}},"credit":[{"lang":"eng","value":"ISC would like to thank Kishore Kumar Kothapalli of Infoblox for bringing this vulnerability to our attention."}],"description":{"description_data":[{"lang":"eng","value":"In BIND 9.3.0 -> 9.11.35, 9.12.0 -> 9.16.21, and versions 9.9.3-S1 -> 9.11.35-S1 and 9.16.8-S1 -> 9.16.21-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -> 9.17.18 of the BIND 9.17 development branch, exploitation of broken authoritative servers using a flaw in response processing can cause degradation in BIND resolver performance. The way the lame cache is currently designed makes it possible for its internal data structures to grow almost infinitely, which may cause significant delays in client query processing."}]},"exploit":[{"lang":"eng","value":"We are not aware of any active exploits."}],"impact":{"cvss":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"LOW","baseScore":5.3,"baseSeverity":"MEDIUM","confidentialityImpact":"NONE","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Authoritative-only BIND 9 servers are NOT vulnerable to this flaw. The purpose of a resolver's lame cache is to ensure that if an authoritative server responds to a resolver's query in a specific broken way, subsequent client queries for the same <QNAME, QTYPE> tuple do not trigger further queries to the same server for a configurable amount of time. The lame cache is enabled by setting the \"lame-ttl\" option in named.conf to a value greater than 0. That option is set to \"lame-ttl 600;\" in the default configuration, which means the lame cache is enabled by default. A successful attack exploiting this flaw causes a named resolver to spend most of its CPU time on managing and checking the lame cache. This results in client queries being responded to with large delays, and increased likelihood of DNS timeouts on client hosts. Affects BIND 9.3.0 -> 9.11.35, 9.12.0 -> 9.16.21, and versions 9.9.3-S1 -> 9.11.35-S1 and 9.16.8-S1 -> 9.16.21-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -> 9.17.18 of the BIND 9.17 development branch."}]}]},"references":{"reference_data":[{"name":"https://kb.isc.org/v1/docs/cve-2021-25219","refsource":"CONFIRM","url":"https://kb.isc.org/v1/docs/cve-2021-25219"},{"refsource":"DEBIAN","name":"DSA-4994","url":"https://www.debian.org/security/2021/dsa-4994"},{"refsource":"MLIST","name":"[debian-lts-announce] 20211102 [SECURITY] [DLA 2807-1] bind9 security update","url":"https://lists.debian.org/debian-lts-announce/2021/11/msg00001.html"},{"refsource":"FEDORA","name":"FEDORA-2021-58e7b873b7","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YTKC4E3HUOLYN5IA4EBL4VAQSWG2ZVTX/"},{"refsource":"FEDORA","name":"FEDORA-2021-39b33260b8","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YGV7SA27CTYLGFJSPUM3V36ZWK7WWDI4/"},{"refsource":"FEDORA","name":"FEDORA-2021-eb8dab50ba","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EF4NAVRV4H3W4GA3LGGZYUKD3HSJBAVW/"},{"url":"https://www.oracle.com/security-alerts/cpuapr2022.html","refsource":"MISC","name":"https://www.oracle.com/security-alerts/cpuapr2022.html"},{"refsource":"CONFIRM","name":"https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"},{"refsource":"CONFIRM","name":"https://security.netapp.com/advisory/ntap-20211118-0002/","url":"https://security.netapp.com/advisory/ntap-20211118-0002/"},{"refsource":"GENTOO","name":"GLSA-202210-25","url":"https://security.gentoo.org/glsa/202210-25"}]},"solution":[{"lang":"eng","value":"Upgrade to the patched release most closely related to your current version of BIND: BIND 9.11.36, BIND 9.16.22, BIND 9.17.19, or for BIND Supported Preview Edition (a special feature preview branch of BIND provided to eligible ISC support customers): BIND 9.11.36-S1, BIND 9.16.22-S1."}],"source":{"discovery":"EXTERNAL"},"work_around":[{"lang":"eng","value":"Setting \"lame-ttl 0;\" disables the lame cache and prevents the performance issue. Our research and testing indicate that in the current Internet there is almost no downside to disabling the lame cache."}]},"nvd":{"publishedDate":"2021-10-27 21:15:00","lastModifiedDate":"2023-11-07 03:31:00","problem_types":["NVD-CWE-noinfo"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"LOW","baseScore":5.3,"baseSeverity":"MEDIUM"},"exploitabilityScore":3.9,"impactScore":1.4},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL","baseScore":5},"severity":"MEDIUM","exploitabilityScore":10,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:isc:bind:9.11.7:s1:*:*:supported_preview:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:isc:bind:9.11.3:s1:*:*:supported_preview:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:isc:bind:9.11.6:s1:*:*:supported_preview:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:isc:bind:9.10.5:s1:*:*:supported_preview:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:isc:bind:9.11.5:s5:*:*:supported_preview:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:isc:bind:9.11.5:s3:*:*:supported_preview:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:isc:bind:9.9.3:s1:*:*:supported_preview:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:isc:bind:9.10.7:s1:*:*:supported_preview:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:isc:bind:9.11.5:s6:*:*:supported_preview:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:isc:bind:9.11.12:s1:*:*:supported_preview:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:isc:bind:9.11.8:s1:*:*:supported_preview:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:isc:bind:9.9.12:s1:*:*:supported_preview:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:isc:bind:9.9.13:s1:*:*:supported_preview:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:isc:bind:9.11.21:s1:*:*:supported_preview:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:isc:bind:9.16.8:s1:*:*:supported_preview:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:isc:bind:9.16.11:s1:*:*:supported_preview:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:isc:bind:9.11.27:s1:*:*:supported_preview:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:isc:bind:9.16.13:s1:*:*:supported_preview:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:isc:bind:9.11.29:s1:*:*:supported_preview:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:isc:bind:9.16.21:s1:*:*:supported_preview:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:isc:bind:*:*:*:*:-:*:*:*","versionStartIncluding":"9.17.0","versionEndExcluding":"9.17.19","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:isc:bind:9.11.35:s1:*:*:supported_preview:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:isc:bind:*:*:*:*:-:*:*:*","versionStartIncluding":"9.12.0","versionEndExcluding":"9.16.22","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:isc:bind:*:*:*:*:-:*:*:*","versionStartIncluding":"9.3.0","versionEndExcluding":"9.11.36","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"AND","children":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*","cpe_name":[]}]}],"cpe_match":[]},{"operator":"AND","children":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*","cpe_name":[]}]}],"cpe_match":[]},{"operator":"AND","children":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*","cpe_name":[]}]}],"cpe_match":[]},{"operator":"AND","children":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:netapp:h300e_firmware:-:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:netapp:h300e:-:*:*:*:*:*:*:*","cpe_name":[]}]}],"cpe_match":[]},{"operator":"AND","children":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:netapp:h500e_firmware:-:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:netapp:h500e:-:*:*:*:*:*:*:*","cpe_name":[]}]}],"cpe_match":[]},{"operator":"AND","children":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:netapp:h700e_firmware:-:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:netapp:h700e:-:*:*:*:*:*:*:*","cpe_name":[]}]}],"cpe_match":[]},{"operator":"AND","children":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*","cpe_name":[]}]}],"cpe_match":[]},{"operator":"AND","children":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*","cpe_name":[]}]}],"cpe_match":[]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:siemens:sinec_infrastructure_network_services:*:*:*:*:*:*:*:*","versionEndExcluding":"1.0.1.1","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:oracle:http_server:12.2.1.3.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:oracle:http_server:12.2.1.4.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2021","CveId":"25219","Ordinal":"199994","Title":"CVE-2021-25219","CVE":"CVE-2021-25219","Year":"2021"},"notes":[{"CveYear":"2021","CveId":"25219","Ordinal":"1","NoteData":"In BIND 9.3.0 -> 9.11.35, 9.12.0 -> 9.16.21, and versions 9.9.3-S1 -> 9.11.35-S1 and 9.16.8-S1 -> 9.16.21-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -> 9.17.18 of the BIND 9.17 development branch, exploitation of broken authoritative servers using a flaw in response processing can cause degradation in BIND resolver performance. The way the lame cache is currently designed makes it possible for its internal data structures to grow almost infinitely, which may cause significant delays in client query processing.","Type":"Description","Title":null},{"CveYear":"2021","CveId":"25219","Ordinal":"2","NoteData":"2021-10-27","Type":"Other","Title":"Published"},{"CveYear":"2021","CveId":"25219","Ordinal":"3","NoteData":"2021-11-18","Type":"Other","Title":"Modified"}]}}}