QID 15124
Date Published: 2021-05-10
QID 15124: ISC BIND Buffer Overflow Vulnerability
ISC BIND (Berkley Internet Domain Name) is an implementation of DNS protocols.
CVE-2021-25216: A second vulnerability in BIND's GSSAPI security policy negotiation can be targeted by a buffer overflow attack.
Affected software:
BIND 9.5.0 -> 9.11.29
BIND 9.12.0 -> 9.16.13
BIND 9.11.3-S1 -> 9.11.29-S1
BIND 9.16.8-S1 -> 9.16.13-S1
BIND 9.17.0 -> 9.17.1
Patched Versions:
BIND 9.11.31
BIND 9.16.15
BIND 9.11.31-S1
BIND 9.16.15-S1
QID Detection Logic:
This unauthenticated check detects vulnerable systems by fetching the version information from the BIND service.
Successfully exploitation could affects integrity, availability, confidentiality
Solution
Customers are advised to upgrade to the patched version 9.11.31, 9.16.15, 9.11.31-S1, 9.16.15-S1 or latest release of ISC BIND.Workaround:
This vulnerability only affects servers configured to use GSS-TSIG, most often to sign dynamic updates. If another mechanism can be used to authenticate updates, the vulnerability can be avoided by choosing not to enable the use of GSS-TSIG features. Prior to the April 2021 BIND releases, on some platforms it was possible to build a working BIND installation that was not vulnerable to CVE-2021-25216 by providing the --disable-isc-spnego command-line argument when running the ./configure script in the top level of the BIND source directory, before compiling and linking named. After the April 2021 BIND releases, all supported branches have removed isc-spnego support. This corrects CVE-2021-25216, but requires that the system have other libraries and header files to support GSS-TSIG functionality, unless such functionality is completely disabled at build time by providing the --without-gssapi argument to the ./configurescript when selecting build options.
This vulnerability only affects servers configured to use GSS-TSIG, most often to sign dynamic updates. If another mechanism can be used to authenticate updates, the vulnerability can be avoided by choosing not to enable the use of GSS-TSIG features. Prior to the April 2021 BIND releases, on some platforms it was possible to build a working BIND installation that was not vulnerable to CVE-2021-25216 by providing the --disable-isc-spnego command-line argument when running the ./configure script in the top level of the BIND source directory, before compiling and linking named. After the April 2021 BIND releases, all supported branches have removed isc-spnego support. This corrects CVE-2021-25216, but requires that the system have other libraries and header files to support GSS-TSIG functionality, unless such functionality is completely disabled at build time by providing the --without-gssapi argument to the ./configurescript when selecting build options.
Vendor References
- BIND CVE-2021-25216 -
kb.isc.org/v1/docs/cve-2021-25216
CVEs related to QID 15124
Software Advisories
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| BIND CVE-2021-25216 |
|