Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2955-1 | bind9 security update |
Debian DLA |
DLA-2955-2 | bind9 regression update |
Debian DSA |
DSA-5105-1 | bind9 security update |
EUVD |
EUVD-2021-12131 | BIND 9.11.0 -> 9.11.36 9.12.0 -> 9.16.26 9.17.0 -> 9.18.0 BIND Supported Preview Editions: 9.11.4-S1 -> 9.11.36-S1 9.16.8-S1 -> 9.16.26-S1 Versions of BIND 9 earlier than those shown - back to 9.1.0, including Supported Preview Editions - are also believed to be affected but have not been tested as they are EOL. The cache could become poisoned with incorrect records leading to queries being made to the wrong servers, which might also result in false information being returned to clients. |
Ubuntu USN |
USN-5332-1 | Bind vulnerabilities |
Ubuntu USN |
USN-5332-2 | Bind vulnerability |
Solution
Upgrade to the patched release most closely related to your current version of BIND: BIND 9.11.37 BIND 9.16.27 BIND 9.18.1 BIND Supported Preview Edition is a special feature preview branch of BIND provided to eligible ISC support customers. BIND 9.11.37-S1 BIND 9.16.27-S1
Workaround
If applicable, modify your configuration to either remove all forwarding or all possibility of recursion. Depending on your use-case, it may be possible to use other zone types to replace forward zones. Active exploits: We are not aware of any active exploits.
No history.
Status: PUBLISHED
Assigner: isc
Published:
Updated: 2024-09-16T17:08:54.143Z
Reserved: 2021-01-15T00:00:00
Link: CVE-2021-25220
No data.
Status : Modified
Published: 2022-03-23T13:15:07.680
Modified: 2024-11-21T05:54:34.523
Link: CVE-2021-25220
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN