QID 15124

Date Published: 2021-05-10

QID 15124: ISC BIND Buffer Overflow Vulnerability

ISC BIND (Berkley Internet Domain Name) is an implementation of DNS protocols.

CVE-2021-25216: A second vulnerability in BIND's GSSAPI security policy negotiation can be targeted by a buffer overflow attack. Affected software:
BIND 9.5.0 -> 9.11.29
BIND 9.12.0 -> 9.16.13
BIND 9.11.3-S1 -> 9.11.29-S1
BIND 9.16.8-S1 -> 9.16.13-S1
BIND 9.17.0 -> 9.17.1

Patched Versions:
BIND 9.11.31
BIND 9.16.15
BIND 9.11.31-S1
BIND 9.16.15-S1

QID Detection Logic:
This unauthenticated check detects vulnerable systems by fetching the version information from the BIND service.

Successfully exploitation could affects integrity, availability, confidentiality

  • CVSS V3 rated as Critical - 9.8 severity.
  • CVSS V2 rated as High - 6.8 severity.
  • Solution
    Customers are advised to upgrade to the patched version 9.11.31, 9.16.15, 9.11.31-S1, 9.16.15-S1 or latest release of ISC BIND.Workaround:
    This vulnerability only affects servers configured to use GSS-TSIG, most often to sign dynamic updates. If another mechanism can be used to authenticate updates, the vulnerability can be avoided by choosing not to enable the use of GSS-TSIG features. Prior to the April 2021 BIND releases, on some platforms it was possible to build a working BIND installation that was not vulnerable to CVE-2021-25216 by providing the --disable-isc-spnego command-line argument when running the ./configure script in the top level of the BIND source directory, before compiling and linking named. After the April 2021 BIND releases, all supported branches have removed isc-spnego support. This corrects CVE-2021-25216, but requires that the system have other libraries and header files to support GSS-TSIG functionality, unless such functionality is completely disabled at build time by providing the --without-gssapi argument to the ./configurescript when selecting build options.
    Vendor References

    CVEs related to QID 15124

    Software Advisories
    Advisory ID Software Component Link
    BIND CVE-2021-25216 URL Logo kb.isc.org/v1/docs/cve-2021-25216