Isc Bind9 vulnerabilities
23 known vulnerabilities affecting isc/bind9.
Total CVEs
23
CISA KEV
0
Public exploits
1
Exploited in wild
0
Severity breakdown
CRITICAL1HIGH14MEDIUM8
Vulnerabilities
Page 1 of 2
CVE-2022-38178HIGHCVSS 7.5vOpen Source Branch 9.9 9.9.12 through versions up to and including 9.9.13vOpen Source Branch 9.10 9.10.7 through versions up to and including 9.10.8+5 more2022-09-21
CVE-2022-38178 [HIGH] CWE-401 CVE-2022-38178: By spoofing the target resolver with responses that have a malformed EdDSA signature, an attacker ca
By spoofing the target resolver with responses that have a malformed EdDSA signature, an attacker can trigger a small memory leak. It is possible to gradually erode available memory to the point where named crashes for lack of resources.
cvelistv5nvd
CVE-2022-38177HIGHCVSS 7.5vOpen Source Branches 9.8 through 9.16 9.8.4 through versions before 9.16.33vSupported Preview Branches 9.9-S through 9.11-S 9.9.4-S1 through versions up to and including 9.11.37-S1+1 more2022-09-21
CVE-2022-38177 [HIGH] CWE-401 CVE-2022-38177: By spoofing the target resolver with responses that have a malformed ECDSA signature, an attacker ca
By spoofing the target resolver with responses that have a malformed ECDSA signature, an attacker can trigger a small memory leak. It is possible to gradually erode available memory to the point where named crashes for lack of resources.
cvelistv5nvd
CVE-2022-2881HIGHCVSS 8.2vOpen Source Branch 9.18 9.18.0 through versions before 9.18.7vDevelopment Branch 9.19 9.19.0 through versions before 9.19.52022-09-21
CVE-2022-2881 [MEDIUM] CWE-125 CVE-2022-2881: The underlying bug might cause read past end of the buffer and either read memory it should not read
The underlying bug might cause read past end of the buffer and either read memory it should not read, or crash the process.
cvelistv5nvd
CVE-2022-2906HIGHCVSS 7.5vOpen Source Branch 9.18 9.18.0 through versions before 9.18.7vDevelopment Branch 9.19 9.19.0 through versions before 9.19.52022-09-21
CVE-2022-2906 [HIGH] CWE-401 CVE-2022-2906: An attacker can leverage this flaw to gradually erode available memory to the point where named cras
An attacker can leverage this flaw to gradually erode available memory to the point where named crashes for lack of resources. Upon restart the attacker would have to begin again, but nevertheless there is the potential to deny service.
cvelistv5nvd
CVE-2022-3080HIGHCVSS 7.5vOpen Source Branch 9.16 9.16.14 through versions before 9.16.33vOpen Source Branch 9.18 9.18.0 through versions before 9.18.7+2 more2022-09-21
CVE-2022-3080 [HIGH] CWE-613 CVE-2022-3080: By sending specific queries to the resolver, an attacker can cause named to crash.
By sending specific queries to the resolver, an attacker can cause named to crash.
cvelistv5nvd
CVE-2022-2795MEDIUMCVSS 5.3vOpen Source Branches 9.0 through 9.16 9.0.0 through versions before 9.16.33vOpen Source Branch 9.18 9.18.0 through versions before 9.18.7+3 more2022-09-21
CVE-2022-2795 [MEDIUM] CVE-2022-2795: By flooding the target resolver with queries exploiting this flaw an attacker can significantly impa
By flooding the target resolver with queries exploiting this flaw an attacker can significantly impair the resolver's performance, effectively denying legitimate clients access to the DNS resolution service.
cvelistv5nvd
CVE-2022-1183HIGHCVSS 7.5vOpen Source Branch 9.18 9.18.0 through versions before 9.18.3vDevelopment Branch 9.19 9.19.02022-05-19
CVE-2022-1183 [HIGH] CWE-617 CVE-2022-1183: On vulnerable configurations, the named daemon may, in some circumstances, terminate with an asserti
On vulnerable configurations, the named daemon may, in some circumstances, terminate with an assertion failure. Vulnerable configurations are those that include a reference to http within the listen-on statements in their named.conf. TLS is used by both DNS over TLS (DoT) and DNS over HTTPS (DoH), but configurations using DoT alone are unaffected. Affec
cvelistv5nvd
CVE-2021-25219MEDIUMCVSS 5.3vOpen Source Branches 9.3 through 9.11 9.3.0 through versions before 9.11.36vOpen Source Branches 9.12 through 9.16 9.12.0 through versions before 9.16.22+3 more2021-10-27
CVE-2021-25219 [MEDIUM] CVE-2021-25219: In BIND 9.3.0 -> 9.11.35, 9.12.0 -> 9.16.21, and versions 9.9.3-S1 -> 9.11.35-S1 and 9.16.8-S1 -> 9.
In BIND 9.3.0 -> 9.11.35, 9.12.0 -> 9.16.21, and versions 9.9.3-S1 -> 9.11.35-S1 and 9.16.8-S1 -> 9.16.21-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -> 9.17.18 of the BIND 9.17 development branch, exploitation of broken authoritative servers using a flaw in response processing can cause degradation in BIND resolver performance.
cvelistv5nvd
CVE-2021-25218HIGHCVSS 7.5vStable Branch 9.16.19vDevelopment Branch 9.17.16+1 more2021-08-18
CVE-2021-25218 [HIGH] CWE-617 CVE-2021-25218: In BIND 9.16.19, 9.17.16. Also, version 9.16.19-S1 of BIND Supported Preview Edition When a vulnerab
In BIND 9.16.19, 9.17.16. Also, version 9.16.19-S1 of BIND Supported Preview Edition When a vulnerable version of named receives a query under the circumstances described above, the named process will terminate due to a failed assertion check. The vulnerability affects only BIND 9 releases 9.16.19, 9.17.16, and release 9.16.19-S1 of the BIND Supported
cvelistv5nvd
CVE-2021-25216CRITICALCVSS 9.8vOpen Source Branches 9.5 though 9.11 9.5.0 through versions before 9.11.31vOpen Source Branches 9.12 though 9.16 9.12.0 through versions before 9.16.14+3 more2021-04-29
CVE-2021-25216 [HIGH] CWE-125 CVE-2021-25216: In BIND 9.5.0 -> 9.11.29, 9.12.0 -> 9.16.13, and versions BIND 9.11.3-S1 -> 9.11.29-S1 and 9.16.8-S1
In BIND 9.5.0 -> 9.11.29, 9.12.0 -> 9.16.13, and versions BIND 9.11.3-S1 -> 9.11.29-S1 and 9.16.8-S1 -> 9.16.13-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -> 9.17.1 of the BIND 9.17 development branch, BIND servers are vulnerable if they are running an affected version and are configured to use GSS-TSIG features. In a con
cvelistv5nvd
CVE-2021-25215HIGHCVSS 7.5vOpen Source Branches 9.0 through 9.11 9.0.0 through versions before 9.11.30vOpen Source Branches 9.12 through 9.16 9.12.0 through versions before 9.16.14+3 more2021-04-29
CVE-2021-25215 [HIGH] CWE-617 CVE-2021-25215: In BIND 9.0.0 -> 9.11.29, 9.12.0 -> 9.16.13, and versions BIND 9.9.3-S1 -> 9.11.29-S1 and 9.16.8-S1
In BIND 9.0.0 -> 9.11.29, 9.12.0 -> 9.16.13, and versions BIND 9.9.3-S1 -> 9.11.29-S1 and 9.16.8-S1 -> 9.16.13-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -> 9.17.11 of the BIND 9.17 development branch, when a vulnerable version of named receives a query for a record triggering the flaw described above, the named process wi
cvelistv5nvd
CVE-2021-25214MEDIUMCVSS 6.5vOpen Source Branch 9.8 9.8.5 through 9.8.8vOpen Source Branches 9.9 through 9.11 9.9.3 through versions before 9.11.30+4 more2021-04-29
CVE-2021-25214 [MEDIUM] CWE-617 CVE-2021-25214: In BIND 9.8.5 -> 9.8.8, 9.9.3 -> 9.11.29, 9.12.0 -> 9.16.13, and versions BIND 9.9.3-S1 -> 9.11.29-S
In BIND 9.8.5 -> 9.8.8, 9.9.3 -> 9.11.29, 9.12.0 -> 9.16.13, and versions BIND 9.9.3-S1 -> 9.11.29-S1 and 9.16.8-S1 -> 9.16.13-S1 of BIND 9 Supported Preview Edition, as well as release versions 9.17.0 -> 9.17.11 of the BIND 9.17 development branch, when a vulnerable version of named receives a malformed IXFR triggering the flaw described above, the
cvelistv5nvd
CVE-2020-8625HIGHCVSS 8.1vOpen Source Branches 9.5 though 9.11 9.5.0 through versions before 9.11.28vOpen Source Branches 9.12 though 9.16 9.12.0 through versions before 9.16.12+3 more2021-02-17
CVE-2020-8625 [HIGH] CWE-120 CVE-2020-8625: BIND servers are vulnerable if they are running an affected version and are configured to use GSS-TS
BIND servers are vulnerable if they are running an affected version and are configured to use GSS-TSIG features. In a configuration which uses BIND's default settings the vulnerable code path is not exposed, but a server can be rendered vulnerable by explicitly setting valid values for the tkey-gssapi-keytab or tkey-gssapi-credentialconfiguration option
cvelistv5nvd
CVE-2020-8620HIGHCVSS 7.5≥ 9.15.6, < *2020-08-21
CVE-2020-8620 [HIGH] CWE-617 CVE-2020-8620: In BIND 9.15.6 -> 9.16.5, 9.17.0 -> 9.17.3, An attacker who can establish a TCP connection with the
In BIND 9.15.6 -> 9.16.5, 9.17.0 -> 9.17.3, An attacker who can establish a TCP connection with the server and send data on that connection can exploit this to trigger the assertion failure, causing the server to exit.
cvelistv5nvd
CVE-2020-8623HIGHCVSS 7.5≥ 9.10.0, < unspecified≥ unspecified, < 9.11.22+5 more2020-08-21
CVE-2020-8623 [HIGH] CWE-617 CVE-2020-8623: In BIND 9.10.0 -> 9.11.21, 9.12.0 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.10.5-S1 -> 9.11.21-S1
In BIND 9.10.0 -> 9.11.21, 9.12.0 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.10.5-S1 -> 9.11.21-S1 of the BIND 9 Supported Preview Edition, An attacker that can reach a vulnerable system with a specially crafted query packet can trigger a crash. To be vulnerable, the system must: * be running BIND that was built with "--enable-native-pkcs11" * be signin
cvelistv5nvd
CVE-2020-8621HIGHCVSS 7.5≥ 9.14.0, < *2020-08-21
CVE-2020-8621 [HIGH] CWE-617 CVE-2020-8621: In BIND 9.14.0 -> 9.16.5, 9.17.0 -> 9.17.3, If a server is configured with both QNAME minimization a
In BIND 9.14.0 -> 9.16.5, 9.17.0 -> 9.17.3, If a server is configured with both QNAME minimization and 'forward first' then an attacker who can send queries to it may be able to trigger the condition that will cause the server to crash. Servers that 'forward only' are not affected.
cvelistv5nvd
CVE-2020-8624MEDIUMCVSS 4.3≥ 9.9.12, < unspecified≥ unspecified, ≤ 9.9.13+10 more2020-08-21
CVE-2020-8624 [MEDIUM] CWE-269 CVE-2020-8624: In BIND 9.9.12 -> 9.9.13, 9.10.7 -> 9.10.8, 9.11.3 -> 9.11.21, 9.12.1 -> 9.16.5, 9.17.0 -> 9.17.3, a
In BIND 9.9.12 -> 9.9.13, 9.10.7 -> 9.10.8, 9.11.3 -> 9.11.21, 9.12.1 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.9.12-S1 -> 9.9.13-S1, 9.11.3-S1 -> 9.11.21-S1 of the BIND 9 Supported Preview Edition, An attacker who has been granted privileges to change a specific subset of the zone's content could abuse these unintended additional privileges to upda
cvelistv5nvd
CVE-2020-8622MEDIUMCVSS 6.5≥ 9.0.0, < unspecified≥ unspecified, < 9.11.22+5 more2020-08-21
CVE-2020-8622 [MEDIUM] CWE-617 CVE-2020-8622: In BIND 9.0.0 -> 9.11.21, 9.12.0 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.9.3-S1 -> 9.11.21-S1 of
In BIND 9.0.0 -> 9.11.21, 9.12.0 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.9.3-S1 -> 9.11.21-S1 of the BIND 9 Supported Preview Edition, An attacker on the network path for a TSIG-signed request, or operating the server receiving the TSIG-signed request, could send a truncated response to that request, triggering an assertion failure, causing the se
cvelistv5nvd
CVE-2020-8618MEDIUMCVSS 4.9v9.16.0 -> 9.16.32020-06-17
CVE-2020-8618 [MEDIUM] CWE-617 CVE-2020-8618: An attacker who is permitted to send zone data to a server via zone transfer can exploit this to int
An attacker who is permitted to send zone data to a server via zone transfer can exploit this to intentionally trigger the assertion failure with a specially constructed zone, denying service to clients.
cvelistv5nvd
CVE-2020-8619MEDIUMCVSS 4.9v9.11.14 through versions before 9.11.20v9.16.0 through versions before 9.16.4+2 more2020-06-17
CVE-2020-8619 [MEDIUM] CWE-404 CVE-2020-8619: In ISC BIND9 versions BIND 9.11.14 -> 9.11.19, BIND 9.14.9 -> 9.14.12, BIND 9.16.0 -> 9.16.3, BIND S
In ISC BIND9 versions BIND 9.11.14 -> 9.11.19, BIND 9.14.9 -> 9.14.12, BIND 9.16.0 -> 9.16.3, BIND Supported Preview Edition 9.11.14-S1 -> 9.11.19-S1: Unless a nameserver is providing authoritative service for one or more zones and at least one zone contains an empty non-terminal entry containing an asterisk ("*") character, this defect cannot be enco
cvelistv5nvd
1 / 2Next →