CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
AI Score
Confidence
High
EPSS
Percentile
80.6%
In BIND 9.3.0 -> 9.11.35, 9.12.0 -> 9.16.21, and versions 9.9.3-S1 -> 9.11.35-S1 and 9.16.8-S1 -> 9.16.21-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -> 9.17.18 of the BIND 9.17 development branch, exploitation of broken authoritative servers using a flaw in response processing can cause degradation in BIND resolver performance. The way the lame cache is currently designed makes it possible for its internal data structures to grow almost infinitely, which may cause significant delays in client query processing.
Vendor | Product | Version | CPE |
---|---|---|---|
isc | bind | 9.11.3 | cpe:/a:isc:bind:9.11.3:s1:supported_preview: |
isc | bind | 9.11.35 | cpe:/a:isc:bind:9.11.35:s1:supported_preview: |
isc | bind | 9.9.13 | cpe:/a:isc:bind:9.9.13:s1:supported_preview: |
isc | bind | 9.16.11 | cpe:/a:isc:bind:9.16.11:s1:supported_preview: |
isc | bind | 9.11.21 | cpe:/a:isc:bind:9.11.21:s1:supported_preview: |
isc | bind | 9.9.3 | cpe:/a:isc:bind:9.9.3:s1:supported_preview: |
isc | bind | 9.10.7 | cpe:/a:isc:bind:9.10.7:s1:supported_preview: |
isc | bind | 9.11.5 | cpe:/a:isc:bind:9.11.5:s6:supported_preview: |
isc | bind | 9.16.8 | cpe:/a:isc:bind:9.16.8:s1:supported_preview: |
isc | bind | 9.16.13 | cpe:/a:isc:bind:9.16.13:s1:supported_preview: |
[
{
"vendor": "ISC",
"product": "BIND9",
"versions": [
{
"version": "Open Source Branches 9.3 through 9.11 9.3.0 through versions before 9.11.36",
"status": "affected"
},
{
"version": "Open Source Branches 9.12 through 9.16 9.12.0 through versions before 9.16.22",
"status": "affected"
},
{
"version": "Supported Preview Branches 9.9-S through 9.11-S 9.9.3-S1 through versions before 9.11.36-S1",
"status": "affected"
},
{
"version": "Supported Preview Branch 9.16-S 9.16.8-S1 through versions before 9.16.22-S1",
"status": "affected"
},
{
"version": "Development Branch 9.17 9.17.0 through versions before 9.17.19",
"status": "affected"
}
]
}
]
cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
kb.isc.org/v1/docs/cve-2021-25219
lists.debian.org/debian-lts-announce/2021/11/msg00001.html
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EF4NAVRV4H3W4GA3LGGZYUKD3HSJBAVW/
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YGV7SA27CTYLGFJSPUM3V36ZWK7WWDI4/
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTKC4E3HUOLYN5IA4EBL4VAQSWG2ZVTX/
security.gentoo.org/glsa/202210-25
security.netapp.com/advisory/ntap-20211118-0002/
www.debian.org/security/2021/dsa-4994
www.oracle.com/security-alerts/cpuapr2022.html
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
AI Score
Confidence
High
EPSS
Percentile
80.6%