Isc Bind 9 vulnerabilities
54 known vulnerabilities affecting isc/bind_9.
Total CVEs
54
CISA KEV
0
Public exploits
1
Exploited in wild
0
Severity breakdown
HIGH40MEDIUM13LOW1
Vulnerabilities
Page 2 of 3
CVE-2023-5517HIGHCVSS 7.5≥ 9.12.0, ≤ 9.16.45≥ 9.18.0, ≤ 9.18.21+3 more2024-02-13
CVE-2023-5517 [HIGH] CWE-617 CVE-2023-5517: A flaw in query-handling code can cause `named` to exit prematurely with an assertion failure when:
A flaw in query-handling code can cause `named` to exit prematurely with an assertion failure when:
- `nxdomain-redirect ;` is configured, and
- the resolver receives a PTR query for an RFC 1918 address that would normally result in an authoritative NXDOMAIN response.
This issue affects BIND 9 versions 9.12.0 through 9.16.45, 9.18.0 through 9.18.21, 9.1
cvelistv5nvd
CVE-2023-5680MEDIUMCVSS 5.3≥ 9.11.3-S1, ≤ 9.11.37-S1≥ 9.16.8-S1, ≤ 9.16.45-S1+1 more2024-02-13
CVE-2023-5680 [MEDIUM] CVE-2023-5680: If a resolver cache has a very large number of ECS records stored for the same name, the process of
If a resolver cache has a very large number of ECS records stored for the same name, the process of cleaning the cache database node for this name can significantly impair query performance.
This issue affects BIND 9 versions 9.11.3-S1 through 9.11.37-S1, 9.16.8-S1 through 9.16.45-S1, and 9.18.11-S1 through 9.18.21-S1.
cvelistv5nvd
CVE-2023-4236HIGHCVSS 7.5≥ 9.18.0, ≤ 9.18.18≥ 9.18.11-S1, ≤ 9.18.18-S12023-09-20
CVE-2023-4236 [HIGH] CWE-617 CVE-2023-4236: A flaw in the networking code handling DNS-over-TLS queries may cause `named` to terminate unexpecte
A flaw in the networking code handling DNS-over-TLS queries may cause `named` to terminate unexpectedly due to an assertion failure. This happens when internal data structures are incorrectly reused under significant DNS-over-TLS query load.
This issue affects BIND 9 versions 9.18.0 through 9.18.18 and 9.18.11-S1 through 9.18.18-S1.
cvelistv5nvd
CVE-2023-3341HIGHCVSS 7.5≥ 9.2.0, ≤ 9.16.43≥ 9.18.0, ≤ 9.18.18+3 more2023-09-20
CVE-2023-3341 [HIGH] CWE-787 CVE-2023-3341: The code that processes control channel messages sent to `named` calls certain functions recursively
The code that processes control channel messages sent to `named` calls certain functions recursively during packet parsing. Recursion depth is only limited by the maximum accepted packet size; depending on the environment, this may cause the packet-parsing code to run out of available stack memory, causing `named` to terminate unexpectedly. Since each i
cvelistv5nvd
CVE-2023-2828HIGHCVSS 7.5≥ 9.11.0, ≤ 9.16.41≥ 9.18.0, ≤ 9.18.15+3 more2023-06-21
CVE-2023-2828 [HIGH] CWE-770 CVE-2023-2828: Every `named` instance configured to run as a recursive resolver maintains a cache database holding
Every `named` instance configured to run as a recursive resolver maintains a cache database holding the responses to the queries it has recently sent to authoritative servers. The size limit for that cache database can be configured using the `max-cache-size` statement in the configuration file; it defaults to 90% of the total amount of memory available
cvelistv5nvd
CVE-2023-2911HIGHCVSS 7.5≥ 9.16.33, ≤ 9.16.41≥ 9.18.7, ≤ 9.18.15+2 more2023-06-21
CVE-2023-2911 [HIGH] CWE-787 CVE-2023-2911: If the `recursive-clients` quota is reached on a BIND 9 resolver configured with both `stale-answer-
If the `recursive-clients` quota is reached on a BIND 9 resolver configured with both `stale-answer-enable yes;` and `stale-answer-client-timeout 0;`, a sequence of serve-stale-related lookups could cause `named` to loop and terminate unexpectedly due to a stack overflow.
This issue affects BIND 9 versions 9.16.33 through 9.16.41, 9.18.7 through 9.18.15
cvelistv5nvd
CVE-2023-2829HIGHCVSS 7.5≥ 9.16.8-S1, ≤ 9.16.41-S1≥ 9.18.11-S1, ≤ 9.18.15-S12023-06-21
CVE-2023-2829 [HIGH] CVE-2023-2829: A `named` instance configured to run as a DNSSEC-validating recursive resolver with the Aggressive U
A `named` instance configured to run as a DNSSEC-validating recursive resolver with the Aggressive Use of DNSSEC-Validated Cache (RFC 8198) option (`synth-from-dnssec`) enabled can be remotely terminated using a zone with a malformed NSEC record.
This issue affects BIND 9 versions 9.16.8-S1 through 9.16.41-S1 and 9.18.11-S1 through 9.18.15-S1.
cvelistv5nvd
CVE-2022-3736HIGHCVSS 7.5≥ 9.16.12, ≤ 9.16.36≥ 9.18.0, ≤ 9.18.10+2 more2023-01-26
CVE-2022-3736 [HIGH] CWE-20 CVE-2022-3736: BIND 9 resolver can crash when stale cache and stale answers are enabled, option `stale-answer-clien
BIND 9 resolver can crash when stale cache and stale answers are enabled, option `stale-answer-client-timeout` is set to a positive integer, and the resolver receives an RRSIG query.
This issue affects BIND 9 versions 9.16.12 through 9.16.36, 9.18.0 through 9.18.10, 9.19.0 through 9.19.8, and 9.16.12-S1 through 9.16.36-S1.
cvelistv5nvd
CVE-2022-3488HIGHCVSS 7.5≥ 9.11.4-S1, ≤ 9.11.37-S1≥ 9.16.8-S1, ≤ 9.16.36-S12023-01-26
CVE-2022-3488 [HIGH] CWE-617 CVE-2022-3488: Processing of repeated responses to the same query, where both responses contain ECS pseudo-options,
Processing of repeated responses to the same query, where both responses contain ECS pseudo-options, but where the first is broken in some way, can cause BIND to exit with an assertion failure.
'Broken' in this context is anything that would cause the resolver to reject the query response, such as a mismatch between query and answer name.
This issue af
cvelistv5nvd
CVE-2022-3924HIGHCVSS 7.5≥ 9.16.12, ≤ 9.16.36≥ 9.18.0, ≤ 9.18.10+2 more2023-01-26
CVE-2022-3924 [HIGH] CWE-617 CVE-2022-3924: This issue can affect BIND 9 resolvers with `stale-answer-enable yes;` that also make use of the opt
This issue can affect BIND 9 resolvers with `stale-answer-enable yes;` that also make use of the option `stale-answer-client-timeout`, configured with a value greater than zero.
If the resolver receives many queries that require recursion, there will be a corresponding increase in the number of clients that are waiting for recursion to complete. If the
cvelistv5nvd
CVE-2022-3094HIGHCVSS 7.5≥ 9.16.0, ≤ 9.16.36≥ 9.18.0, ≤ 9.18.10+2 more2023-01-26
CVE-2022-3094 [HIGH] CWE-416 CVE-2022-3094: Sending a flood of dynamic DNS updates may cause `named` to allocate large amounts of memory. This,
Sending a flood of dynamic DNS updates may cause `named` to allocate large amounts of memory. This, in turn, may cause `named` to exit due to a lack of free memory. We are not aware of any cases where this has been exploited.
Memory is allocated prior to the checking of access permissions (ACLs) and is retained during the processing of a dynamic update
cvelistv5nvd
CVE-2019-6476HIGHCVSS 7.5v9.14.0 up to 9.14.6v9.15.0 up to 9.15.42019-10-17
CVE-2019-6476 [MEDIUM] CWE-617 CVE-2019-6476: A defect in code added to support QNAME minimization can cause named to exit with an assertion failu
A defect in code added to support QNAME minimization can cause named to exit with an assertion failure if a forwarder returns a referral rather than resolving the query. This affects BIND versions 9.14.0 up to 9.14.6, and 9.15.0 up to 9.15.4.
cvelistv5nvd
CVE-2019-6475HIGHCVSS 7.5v9.14.0 up to 9.14.6v9.15.0 up to 9.15.42019-10-17
CVE-2019-6475 [MEDIUM] CWE-345 CVE-2019-6475: Mirror zones are a BIND feature allowing recursive servers to pre-cache zone data provided by other
Mirror zones are a BIND feature allowing recursive servers to pre-cache zone data provided by other servers. A mirror zone is similar to a zone of type secondary, except that its data is subject to DNSSEC validation before being used in answers, as if it had been looked up via traditional recursion, and when mirror zone data cannot be validated, BIND f
cvelistv5nvd
CVE-2018-5744HIGHCVSS 7.5vBIND 9.10.7 -> 9.10.8-P1, 9.11.3 -> 9.11.5-P1, 9.12.0 -> 9.12.3-P1, and versions 9.10.7-S1 -> 9.11.5-S3 of BIND 9 Supported Preview Edition. Versions 9.13.0 -> 9.13.6 of the 9.13 development branch are also affected.2019-10-09
CVE-2018-5744 [HIGH] CWE-772 CVE-2018-5744: A failure to free memory can occur when processing messages having a specific combination of EDNS op
A failure to free memory can occur when processing messages having a specific combination of EDNS options. Versions affected are: BIND 9.10.7 -> 9.10.8-P1, 9.11.3 -> 9.11.5-P1, 9.12.0 -> 9.12.3-P1, and versions 9.10.7-S1 -> 9.11.5-S3 of BIND 9 Supported Preview Edition. Versions 9.13.0 -> 9.13.6 of the 9.13 development branch are also affected.
cvelistv5nvd
CVE-2018-5743HIGHCVSS 7.5vBIND 9.9.0 -> 9.10.8-P1, 9.11.0 -> 9.11.6, 9.12.0 -> 9.12.4, 9.14.0. BIND 9 Supported Preview Edition versions 9.9.3-S1 -> 9.11.5-S3, and 9.11.5-S5. Versions 9.13.0 -> 9.13.7 of the 9.13 development branch are also affected. Versions prior to BIND 9.9.0 have not been evaluated for vulnerability to CVE-2018-5743.2019-10-09
CVE-2018-5743 [HIGH] CWE-770 CVE-2018-5743: By design, BIND is intended to limit the number of TCP clients that can be connected at any given ti
By design, BIND is intended to limit the number of TCP clients that can be connected at any given time. The number of allowed connections is a tunable parameter which, if unset, defaults to a conservative value for most servers. Unfortunately, the code which was intended to limit the number of simultaneous connections contained an error which could be e
cvelistv5nvd
CVE-2019-6467HIGHCVSS 7.5vBIND 9.12.0-> 9.12.4, 9.14.0. Also affects all releases in the 9.13 development branch.2019-10-09
CVE-2019-6467 [HIGH] CWE-617 CVE-2019-6467: A programming error in the nxdomain-redirect feature can cause an assertion failure in query.c if th
A programming error in the nxdomain-redirect feature can cause an assertion failure in query.c if the alternate namespace used by nxdomain-redirect is a descendant of a zone that is served locally. The most likely scenario where this might occur is if the server, in addition to performing NXDOMAIN redirection for recursive clients, is also serving a loc
cvelistv5nvd
CVE-2019-6471MEDIUMCVSS 5.9vBIND 9.11.0 -> 9.11.7, 9.12.0 -> 9.12.4-P1, 9.14.0 -> 9.14.2. Also all releases of the BIND 9.13 development branch and version 9.15.0 of the BIND 9.15 development branch and BIND Supported Preview Edition versions 9.11.3-S1 -> 9.11.7-S1.2019-10-09
CVE-2019-6471 [MEDIUM] CWE-362 CVE-2019-6471: A race condition which may occur when discarding malformed packets can result in BIND exiting due to
A race condition which may occur when discarding malformed packets can result in BIND exiting due to a REQUIRE assertion failure in dispatch.c. Versions affected: BIND 9.11.0 -> 9.11.7, 9.12.0 -> 9.12.4-P1, 9.14.0 -> 9.14.2. Also all releases of the BIND 9.13 development branch and version 9.15.0 of the BIND 9.15 development branch and BIND Supported
cvelistv5nvd
CVE-2018-5745MEDIUMCVSS 4.9vBIND 9.9.0 -> 9.10.8-P1, 9.11.0 -> 9.11.5-P1, 9.12.0 -> 9.12.3-P1, and versions 9.9.3-S1 -> 9.11.5-S3 of BIND 9 Supported Preview Edition. Versions 9.13.0 -> 9.13.6 of the 9.13 development branch are also affected. Versions prior to BIND 9.9.0 have not been evaluated for vulnerability to CVE-2018-5745.2019-10-09
CVE-2018-5745 [MEDIUM] CWE-327 CVE-2018-5745: "managed-keys" is a feature which allows a BIND resolver to automatically maintain the keys used by
"managed-keys" is a feature which allows a BIND resolver to automatically maintain the keys used by trust anchors which operators configure for use in DNSSEC validation. Due to an error in the managed-keys feature it is possible for a BIND server which uses managed-keys to exit due to an assertion failure if, during key rollover, a trust anchor's keys
cvelistv5nvd
CVE-2019-6465MEDIUMCVSS 5.3vBIND 9.9.0 -> 9.10.8-P1, 9.11.0 -> 9.11.5-P2, 9.12.0 -> 9.12.3-P2, and versions 9.9.3-S1 -> 9.11.5-S3 of BIND 9 Supported Preview Edition. Versions 9.13.0 -> 9.13.6 of the 9.13 development branch are also affected. Versions prior to BIND 9.9.0 have not been evaluated for vulnerability to CVE-2019-6465.2019-10-09
CVE-2019-6465 [MEDIUM] CWE-732 CVE-2019-6465: Controls for zone transfers may not be properly applied to Dynamically Loadable Zones (DLZs) if the
Controls for zone transfers may not be properly applied to Dynamically Loadable Zones (DLZs) if the zones are writable Versions affected: BIND 9.9.0 -> 9.10.8-P1, 9.11.0 -> 9.11.5-P2, 9.12.0 -> 9.12.3-P2, and versions 9.9.3-S1 -> 9.11.5-S3 of BIND 9 Supported Preview Edition. Versions 9.13.0 -> 9.13.6 of the 9.13 development branch are also affected. V
cvelistv5nvd
CVE-2017-3141HIGHCVSS 7.8PoCv9.2.6-P2->9.2.9, 9.3.2-P1->9.3.6, 9.4.0->9.8.8, 9.9.0->9.9.10, 9.10.0->9.10.5, 9.11.0->9.11.1, 9.9.3-S1->9.9.10-S1, 9.10.5-S12019-01-16
CVE-2017-3141 [HIGH] CWE-428 CVE-2017-3141: The BIND installer on Windows uses an unquoted service path which can enable a local user to achieve
The BIND installer on Windows uses an unquoted service path which can enable a local user to achieve privilege escalation if the host file system permissions allow this. Affects BIND 9.2.6-P2->9.2.9, 9.3.2-P1->9.3.6, 9.4.0->9.8.8, 9.9.0->9.9.10, 9.10.0->9.10.5, 9.11.0->9.11.1, 9.9.3-S1->9.9.10-S1, 9.10.5-S1.
cvelistv5nvd