Project Subscriptions
| Vendors | Products |
|---|---|
|
Fedoraproject
Subscribe
|
Fedora
Subscribe
|
|
Isc
Subscribe
|
Bind
Subscribe
|
|
Juniper
Subscribe
|
Junos
Subscribe
Srx100
Subscribe
Srx110
Subscribe
Srx1400
Subscribe
Srx1500
Subscribe
Srx210
Subscribe
Srx220
Subscribe
Srx240
Subscribe
Srx240h2
Subscribe
Srx240m
Subscribe
Srx300
Subscribe
Srx320
Subscribe
Srx340
Subscribe
Srx3400
Subscribe
Srx345
Subscribe
Srx3600
Subscribe
Srx380
Subscribe
Srx4000
Subscribe
Srx4100
Subscribe
Srx4200
Subscribe
Srx4600
Subscribe
Srx5000
Subscribe
Srx5400
Subscribe
Srx550
Subscribe
Srx550 Hm
Subscribe
Srx550m
Subscribe
Srx5600
Subscribe
Srx5800
Subscribe
Srx650
Subscribe
|
|
Netapp
Subscribe
|
H300e
Subscribe
H300e Firmware
Subscribe
H300s
Subscribe
H300s Firmware
Subscribe
H410c
Subscribe
H410c Firmware
Subscribe
H410s
Subscribe
H410s Firmware
Subscribe
H500e
Subscribe
H500e Firmware
Subscribe
H500s
Subscribe
H500s Firmware
Subscribe
H700e
Subscribe
H700e Firmware
Subscribe
H700s
Subscribe
H700s Firmware
Subscribe
|
|
Redhat
Subscribe
|
|
|
Siemens
Subscribe
|
Sinec Ins
Subscribe
|
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2955-1 | bind9 security update |
Debian DLA |
DLA-2955-2 | bind9 regression update |
Debian DSA |
DSA-5105-1 | bind9 security update |
EUVD |
EUVD-2021-12131 | BIND 9.11.0 -> 9.11.36 9.12.0 -> 9.16.26 9.17.0 -> 9.18.0 BIND Supported Preview Editions: 9.11.4-S1 -> 9.11.36-S1 9.16.8-S1 -> 9.16.26-S1 Versions of BIND 9 earlier than those shown - back to 9.1.0, including Supported Preview Editions - are also believed to be affected but have not been tested as they are EOL. The cache could become poisoned with incorrect records leading to queries being made to the wrong servers, which might also result in false information being returned to clients. |
Ubuntu USN |
USN-5332-1 | Bind vulnerabilities |
Ubuntu USN |
USN-5332-2 | Bind vulnerability |
Solution
Upgrade to the patched release most closely related to your current version of BIND: BIND 9.11.37 BIND 9.16.27 BIND 9.18.1 BIND Supported Preview Edition is a special feature preview branch of BIND provided to eligible ISC support customers. BIND 9.11.37-S1 BIND 9.16.27-S1
Workaround
If applicable, modify your configuration to either remove all forwarding or all possibility of recursion. Depending on your use-case, it may be possible to use other zone types to replace forward zones. Active exploits: We are not aware of any active exploits.
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: isc
Published:
Updated: 2024-09-16T17:08:54.143Z
Reserved: 2021-01-15T00:00:00
Link: CVE-2021-25220
No data.
Status : Modified
Published: 2022-03-23T13:15:07.680
Modified: 2024-11-21T05:54:34.523
Link: CVE-2021-25220
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN