Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
EUVD-2021-12129 | In BIND 9.16.19, 9.17.16. Also, version 9.16.19-S1 of BIND Supported Preview Edition When a vulnerable version of named receives a query under the circumstances described above, the named process will terminate due to a failed assertion check. The vulnerability affects only BIND 9 releases 9.16.19, 9.17.16, and release 9.16.19-S1 of the BIND Supported Preview Edition. |
Solution
Upgrade to the patched release most closely related to your current version of BIND: BIND 9.16.20 BIND 9.17.17 BIND Supported Preview Edition is a special feature preview branch of BIND provided to eligible ISC support customers. BIND 9.16.20-S1
Workaround
Disabling RRL in all views, including the built-in CHAOS class view "_bind", prevents the faulty assertion from being reached. This can be done by removing all existing rate-limit statements from named.conf, and defining a replacement for the default CHAOS view: view override_bind chaos { recursion no; notify no; allow-new-zones no; max-cache-size 2M; zone "version.bind" chaos { type primary; database "_builtin version"; }; zone "hostname.bind" chaos { type primary; database "_builtin hostname"; }; zone "authors.bind" chaos { type primary; database "_builtin authors"; }; zone "id.server" chaos { type primary; database "_builtin id"; }; };
No history.

Status: PUBLISHED
Assigner: isc
Published:
Updated: 2024-09-17T03:07:43.591Z
Reserved: 2021-01-15T00:00:00
Link: CVE-2021-25218

No data.

Status : Modified
Published: 2021-08-18T19:15:07.333
Modified: 2024-11-21T05:54:34.187
Link: CVE-2021-25218


No data.