Isc Bind vulnerabilities

172 known vulnerabilities affecting isc/bind.

Total CVEs
172
CISA KEV
0
Public exploits
15
Exploited in wild
2
Severity breakdown
CRITICAL8HIGH83MEDIUM75LOW6

Vulnerabilities

Page 2 of 9
CVE-2022-38177HIGHCVSS 7.5≥ 9.8.4, ≤ 9.16.32v9.9.3+22 more2022-09-21
CVE-2022-38177 [HIGH] CWE-401 CVE-2022-38177: By spoofing the target resolver with responses that have a malformed ECDSA signature, an attacker ca By spoofing the target resolver with responses that have a malformed ECDSA signature, an attacker can trigger a small memory leak. It is possible to gradually erode available memory to the point where named crashes for lack of resources.
nvd
CVE-2022-2795MEDIUMCVSS 5.3≥ 9.0.0, < 9.16.33≥ 9.18.0, < 9.18.7+24 more2022-09-21
CVE-2022-2795 [MEDIUM] CVE-2022-2795: By flooding the target resolver with queries exploiting this flaw an attacker can significantly impa By flooding the target resolver with queries exploiting this flaw an attacker can significantly impair the resolver's performance, effectively denying legitimate clients access to the DNS resolution service.
nvd
CVE-2022-1183HIGHCVSS 7.5≥ 9.18.0, ≤ 9.18.2v9.19.02022-05-19
CVE-2022-1183 [HIGH] CWE-617 CVE-2022-1183: On vulnerable configurations, the named daemon may, in some circumstances, terminate with an asserti On vulnerable configurations, the named daemon may, in some circumstances, terminate with an assertion failure. Vulnerable configurations are those that include a reference to http within the listen-on statements in their named.conf. TLS is used by both DNS over TLS (DoT) and DNS over HTTPS (DoH), but configurations using DoT alone are unaffected. Affec
nvd
CVE-2022-0635HIGHCVSS 7.5v9.18.0vOpen Source Branch 9.18 9.18.02022-03-23
CVE-2022-0635 [HIGH] CWE-617 CVE-2022-0635: Versions affected: BIND 9.18.0 When a vulnerable version of named receives a series of specific quer Versions affected: BIND 9.18.0 When a vulnerable version of named receives a series of specific queries, the named process will eventually terminate due to a failed assertion check.
cvelistv5nvd
CVE-2021-25220MEDIUMCVSS 6.8≥ 9.11.0, < 9.11.37≥ 9.11.4, < 9.11.37+9 more2022-03-23
CVE-2021-25220 [MEDIUM] CWE-444 CVE-2021-25220: BIND 9.11.0 -> 9.11.36 9.12.0 -> 9.16.26 9.17.0 -> 9.18.0 BIND Supported Preview Editions: 9.11.4-S1 BIND 9.11.0 -> 9.11.36 9.12.0 -> 9.16.26 9.17.0 -> 9.18.0 BIND Supported Preview Editions: 9.11.4-S1 -> 9.11.36-S1 9.16.8-S1 -> 9.16.26-S1 Versions of BIND 9 earlier than those shown - back to 9.1.0, including Supported Preview Editions - are also believed to be affected but have not been tested as they are EOL. The cache could become poisoned with
cvelistv5nvd
CVE-2022-0396MEDIUMCVSS 5.3≥ 9.16.11, < 9.16.27≥ 9.17.0, ≤ 9.18.0+4 more2022-03-23
CVE-2022-0396 [MEDIUM] CWE-404 CVE-2022-0396: BIND 9.16.11 -> 9.16.26, 9.17.0 -> 9.18.0 and versions 9.16.11-S1 -> 9.16.26-S1 of the BIND Supporte BIND 9.16.11 -> 9.16.26, 9.17.0 -> 9.18.0 and versions 9.16.11-S1 -> 9.16.26-S1 of the BIND Supported Preview Edition. Specifically crafted TCP streams can cause connections to BIND to remain in CLOSE_WAIT status for an indefinite period of time, even after the client has terminated the connection.
cvelistv5nvd
CVE-2022-0667HIGHCVSS 7.5v9.18.02022-03-22
CVE-2022-0667 [HIGH] CWE-617 CVE-2022-0667: When the vulnerability is triggered the BIND process will exit. BIND 9.18.0 When the vulnerability is triggered the BIND process will exit. BIND 9.18.0
cvelistv5nvd
CVE-2021-25219MEDIUMCVSS 5.3≥ 9.3.0, < 9.11.36≥ 9.12.0, < 9.16.22+20 more2021-10-27
CVE-2021-25219 [MEDIUM] CVE-2021-25219: In BIND 9.3.0 -> 9.11.35, 9.12.0 -> 9.16.21, and versions 9.9.3-S1 -> 9.11.35-S1 and 9.16.8-S1 -> 9. In BIND 9.3.0 -> 9.11.35, 9.12.0 -> 9.16.21, and versions 9.9.3-S1 -> 9.11.35-S1 and 9.16.8-S1 -> 9.16.21-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -> 9.17.18 of the BIND 9.17 development branch, exploitation of broken authoritative servers using a flaw in response processing can cause degradation in BIND resolver performance.
nvd
CVE-2021-25218HIGHCVSS 7.5v9.16.19v9.17.162021-08-18
CVE-2021-25218 [HIGH] CWE-617 CVE-2021-25218: In BIND 9.16.19, 9.17.16. Also, version 9.16.19-S1 of BIND Supported Preview Edition When a vulnerab In BIND 9.16.19, 9.17.16. Also, version 9.16.19-S1 of BIND Supported Preview Edition When a vulnerable version of named receives a query under the circumstances described above, the named process will terminate due to a failed assertion check. The vulnerability affects only BIND 9 releases 9.16.19, 9.17.16, and release 9.16.19-S1 of the BIND Supported
nvd
CVE-2021-25216CRITICALCVSS 9.8≥ 9.0.0, < 9.11.31≥ 9.12.0, < 9.16.15+18 more2021-04-29
CVE-2021-25216 [HIGH] CWE-125 CVE-2021-25216: In BIND 9.5.0 -> 9.11.29, 9.12.0 -> 9.16.13, and versions BIND 9.11.3-S1 -> 9.11.29-S1 and 9.16.8-S1 In BIND 9.5.0 -> 9.11.29, 9.12.0 -> 9.16.13, and versions BIND 9.11.3-S1 -> 9.11.29-S1 and 9.16.8-S1 -> 9.16.13-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -> 9.17.1 of the BIND 9.17 development branch, BIND servers are vulnerable if they are running an affected version and are configured to use GSS-TSIG features. In a con
nvd
CVE-2021-25215HIGHCVSS 7.5≥ 9.0.0, < 9.11.31≥ 9.12.0, < 9.16.15+18 more2021-04-29
CVE-2021-25215 [HIGH] CWE-617 CVE-2021-25215: In BIND 9.0.0 -> 9.11.29, 9.12.0 -> 9.16.13, and versions BIND 9.9.3-S1 -> 9.11.29-S1 and 9.16.8-S1 In BIND 9.0.0 -> 9.11.29, 9.12.0 -> 9.16.13, and versions BIND 9.9.3-S1 -> 9.11.29-S1 and 9.16.8-S1 -> 9.16.13-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -> 9.17.11 of the BIND 9.17 development branch, when a vulnerable version of named receives a query for a record triggering the flaw described above, the named process wi
nvd
CVE-2021-25214MEDIUMCVSS 6.5≥ 9.8.5, ≤ 9.8.8≥ 9.9.3, < 9.11.31+19 more2021-04-29
CVE-2021-25214 [MEDIUM] CWE-617 CVE-2021-25214: In BIND 9.8.5 -> 9.8.8, 9.9.3 -> 9.11.29, 9.12.0 -> 9.16.13, and versions BIND 9.9.3-S1 -> 9.11.29-S In BIND 9.8.5 -> 9.8.8, 9.9.3 -> 9.11.29, 9.12.0 -> 9.16.13, and versions BIND 9.9.3-S1 -> 9.11.29-S1 and 9.16.8-S1 -> 9.16.13-S1 of BIND 9 Supported Preview Edition, as well as release versions 9.17.0 -> 9.17.11 of the BIND 9.17 development branch, when a vulnerable version of named receives a malformed IXFR triggering the flaw described above, the
nvd
CVE-2020-8625HIGHCVSS 8.1≥ 9.5.0, ≤ 9.11.27≥ 9.12.0, ≤ 9.16.11+11 more2021-02-17
CVE-2020-8625 [HIGH] CWE-120 CVE-2020-8625: BIND servers are vulnerable if they are running an affected version and are configured to use GSS-TS BIND servers are vulnerable if they are running an affected version and are configured to use GSS-TSIG features. In a configuration which uses BIND's default settings the vulnerable code path is not exposed, but a server can be rendered vulnerable by explicitly setting valid values for the tkey-gssapi-keytab or tkey-gssapi-credentialconfiguration option
nvd
CVE-2020-8620HIGHCVSS 7.5≥ 9.15.6, ≤ 9.16.5≥ 9.17.0, ≤ 9.17.3+4 more2020-08-21
CVE-2020-8620 [HIGH] CWE-617 CVE-2020-8620: In BIND 9.15.6 -> 9.16.5, 9.17.0 -> 9.17.3, An attacker who can establish a TCP connection with the In BIND 9.15.6 -> 9.16.5, 9.17.0 -> 9.17.3, An attacker who can establish a TCP connection with the server and send data on that connection can exploit this to trigger the assertion failure, causing the server to exit.
nvd
CVE-2020-8623HIGHCVSS 7.5≥ 9.10.0, ≤ 9.11.21≥ 9.12.1, ≤ 9.16.5+3 more2020-08-21
CVE-2020-8623 [HIGH] CWE-617 CVE-2020-8623: In BIND 9.10.0 -> 9.11.21, 9.12.0 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.10.5-S1 -> 9.11.21-S1 In BIND 9.10.0 -> 9.11.21, 9.12.0 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.10.5-S1 -> 9.11.21-S1 of the BIND 9 Supported Preview Edition, An attacker that can reach a vulnerable system with a specially crafted query packet can trigger a crash. To be vulnerable, the system must: * be running BIND that was built with "--enable-native-pkcs11" * be signin
nvd
CVE-2020-8621HIGHCVSS 7.5≥ 9.14.0, ≤ 9.16.5≥ 9.17.0, ≤ 9.17.32020-08-21
CVE-2020-8621 [HIGH] CWE-617 CVE-2020-8621: In BIND 9.14.0 -> 9.16.5, 9.17.0 -> 9.17.3, If a server is configured with both QNAME minimization a In BIND 9.14.0 -> 9.16.5, 9.17.0 -> 9.17.3, If a server is configured with both QNAME minimization and 'forward first' then an attacker who can send queries to it may be able to trigger the condition that will cause the server to crash. Servers that 'forward only' are not affected.
nvd
CVE-2020-8624MEDIUMCVSS 4.3≥ 9.9.12, ≤ 9.9.13≥ 9.10.7, ≤ 9.10.8+7 more2020-08-21
CVE-2020-8624 [MEDIUM] CWE-269 CVE-2020-8624: In BIND 9.9.12 -> 9.9.13, 9.10.7 -> 9.10.8, 9.11.3 -> 9.11.21, 9.12.1 -> 9.16.5, 9.17.0 -> 9.17.3, a In BIND 9.9.12 -> 9.9.13, 9.10.7 -> 9.10.8, 9.11.3 -> 9.11.21, 9.12.1 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.9.12-S1 -> 9.9.13-S1, 9.11.3-S1 -> 9.11.21-S1 of the BIND 9 Supported Preview Edition, An attacker who has been granted privileges to change a specific subset of the zone's content could abuse these unintended additional privileges to upda
nvd
CVE-2020-8622MEDIUMCVSS 6.5≥ 9.0.0, ≤ 9.11.21≥ 9.12.0, ≤ 9.16.5+3 more2020-08-21
CVE-2020-8622 [MEDIUM] CWE-617 CVE-2020-8622: In BIND 9.0.0 -> 9.11.21, 9.12.0 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.9.3-S1 -> 9.11.21-S1 of In BIND 9.0.0 -> 9.11.21, 9.12.0 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.9.3-S1 -> 9.11.21-S1 of the BIND 9 Supported Preview Edition, An attacker on the network path for a TSIG-signed request, or operating the server receiving the TSIG-signed request, could send a truncated response to that request, triggering an assertion failure, causing the se
nvd
CVE-2020-8619MEDIUMCVSS 4.9≥ 9.11.14, ≤ 9.11.19≥ 9.11.14-s1, ≤ 9.11.19-s1+2 more2020-06-17
CVE-2020-8619 [MEDIUM] CWE-404 CVE-2020-8619: In ISC BIND9 versions BIND 9.11.14 -> 9.11.19, BIND 9.14.9 -> 9.14.12, BIND 9.16.0 -> 9.16.3, BIND S In ISC BIND9 versions BIND 9.11.14 -> 9.11.19, BIND 9.14.9 -> 9.14.12, BIND 9.16.0 -> 9.16.3, BIND Supported Preview Edition 9.11.14-S1 -> 9.11.19-S1: Unless a nameserver is providing authoritative service for one or more zones and at least one zone contains an empty non-terminal entry containing an asterisk ("*") character, this defect cannot be enco
nvd
CVE-2020-8618MEDIUMCVSS 4.9≥ 9.16.0, ≤ 9.16.32020-06-17
CVE-2020-8618 [MEDIUM] CWE-617 CVE-2020-8618: An attacker who is permitted to send zone data to a server via zone transfer can exploit this to int An attacker who is permitted to send zone data to a server via zone transfer can exploit this to intentionally trigger the assertion failure with a specially constructed zone, denying service to clients.
nvd