This issue affects BIND 9 versions 9.18.0 through 9.18.39, 9.20.0 through 9.20.13, 9.21.0 through 9.21.12, 9.18.11-S1 through 9.18.39-S1, and 9.20.9-S1 through 9.20.13-S1.
Metrics
Affected Vendors & Products
No advisories yet.
Solution
Upgrade to the patched release most closely related to your current version of BIND 9: 9.18.41, 9.20.15, 9.21.14, 9.18.41-S1, or 9.20.15-S1.
Workaround
No workarounds known.
Thu, 23 Oct 2025 00:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-400 | |
References |
| |
Metrics |
threat_severity
|
threat_severity
|
Wed, 22 Oct 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 22 Oct 2025 16:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Querying for records within a specially crafted zone containing certain malformed DNSKEY records can lead to CPU exhaustion. This issue affects BIND 9 versions 9.18.0 through 9.18.39, 9.20.0 through 9.20.13, 9.21.0 through 9.21.12, 9.18.11-S1 through 9.18.39-S1, and 9.20.9-S1 through 9.20.13-S1. | |
Title | Resource exhaustion via malformed DNSKEY handling | |
Weaknesses | CWE-405 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: isc
Published:
Updated: 2025-10-22T17:29:39.128Z
Reserved: 2025-08-06T17:32:34.755Z
Link: CVE-2025-8677

Updated: 2025-10-22T17:29:30.267Z

Status : Awaiting Analysis
Published: 2025-10-22T16:15:46.043
Modified: 2025-10-22T21:12:32.330
Link: CVE-2025-8677


No data.