QID 15127
Date Published: 2021-09-06
QID 15127: ISC BIND Assertion Failure Vulnerability
ISC BIND (Berkley Internet Domain Name) is an implementation of DNS protocols.
Affected versions:
BIND 9.16.19
BIND 9.17.16
BIND Preview Edition 9.16.19-S1
Patched Versions:
BIND 9.16.20
BIND 9.17.17
BIND 9.16.20-S1
QID Detection Logic:
This unauthenticated check detects vulnerable systems by fetching the version information from the BIND service.
Successfully exploitation could affects integrity, availability, confidentiality
Solution
Customers are advised to upgrade to the patched version 9.16.20, 9.17.17, 9.16.20-S1 or latest release of ISC BIND.
Workaround:
Workaround:
Disabling RRL in all views, including the built-in CHAOS class view "_bind", prevents the faulty assertion from being reached. This can be done by removing all existing rate-limit statements from named.conf, and defining a replacement for the default CHAOS view
Vendor References
- BIND CVE-2021-25218 -
kb.isc.org/docs/cve-2021-25218
CVEs related to QID 15127
Software Advisories
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| CVE-2021-25218 |
|