Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
DLA-2647-1 | bind9 security update |
![]() |
DSA-4909-1 | bind9 security update |
![]() |
USN-4929-1 | Bind vulnerabilities |
![]() |
USN-7739-1 | Bind vulnerabilities |
Solution
Upgrade to the patched release most closely related to your current version of BIND: BIND 9.11.31 BIND 9.16.15 BIND 9.17.12 BIND Supported Preview Edition is a special feature preview branch of BIND provided to eligible ISC support customers. BIND 9.11.31-S1 BIND 9.16.15-S1
Workaround
This vulnerability only affects servers configured to use GSS-TSIG, most often to sign dynamic updates. If another mechanism can be used to authenticate updates, the vulnerability can be avoided by choosing not to enable the use of GSS-TSIG features. Prior to the April 2021 BIND releases, on some platforms it was possible to build a working BIND installation that was not vulnerable to CVE-2021-25216 by providing the --disable-isc-spnego command-line argument when running the ./configure script in the top level of the BIND source directory, before compiling and linking named. After the April 2021 BIND releases, all supported branches have removed isc-spnego support. This corrects CVE-2021-25216, but requires that the system have other libraries and header files to support GSS-TSIG functionality, unless such functionality is completely disabled at build time by providing the --without-gssapi argument to the ./configurescript when selecting build options.
No history.

Status: PUBLISHED
Assigner: isc
Published:
Updated: 2024-09-16T22:25:23.581Z
Reserved: 2021-01-15T00:00:00
Link: CVE-2021-25216

No data.

Status : Modified
Published: 2021-04-29T01:15:08.047
Modified: 2024-11-21T05:54:33.850
Link: CVE-2021-25216


No data.