QID 15127

Date Published: 2021-09-06

QID 15127: ISC BIND Assertion Failure Vulnerability

ISC BIND (Berkley Internet Domain Name) is an implementation of DNS protocols.

Affected versions:
BIND 9.16.19
BIND 9.17.16
BIND Preview Edition 9.16.19-S1

Patched Versions:
BIND 9.16.20
BIND 9.17.17 BIND 9.16.20-S1

QID Detection Logic:
This unauthenticated check detects vulnerable systems by fetching the version information from the BIND service.

Successfully exploitation could affects integrity, availability, confidentiality

  • CVSS V3 rated as High - 7.5 severity.
  • CVSS V2 rated as Medium - 5 severity.
  • Solution
    Customers are advised to upgrade to the patched version 9.16.20, 9.17.17, 9.16.20-S1 or latest release of ISC BIND.
    Workaround:

    Disabling RRL in all views, including the built-in CHAOS class view "_bind", prevents the faulty assertion from being reached. This can be done by removing all existing rate-limit statements from named.conf, and defining a replacement for the default CHAOS view

    Vendor References

    CVEs related to QID 15127

    Software Advisories
    Advisory ID Software Component Link
    CVE-2021-25218 URL Logo kb.isc.org/docs/cve-2021-25218