CVE-2021-25219 PUBLISHED

In BIND 9.3.0 -> 9.11.35, 9.12.0 -> 9.16.21, and versions 9.9.3-S1 -> 9.11.35-S1 and 9.16.8-S1 -> 9.16.21-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -> 9.17.18 of the BIND 9.17 development branch, exploitation of broken authoritative servers using a flaw in response processing can cause degradation in BIND resolver performance. The way the lame cache is currently designed makes it possible for its internal data structures to grow almost infinitely, which may cause significant delays in client query processing.

EPSS 0.96% · 76.3th percentile

Risk Scores

EPSS Score
0.96%
76.3th percentile

Affected Products

VendorProductVersions
Ubuntu:22.04:LTSbind91:9.16.15-1ubuntu1, 0
Ubuntu:18.04:LTSbind91:9.11.3+dfsg-1ubuntu1.15, 1:9.11.3+dfsg-1ubuntu1.14, 1:9.11.3+dfsg-1ubuntu1.13
Ubuntu:Pro:14.04:LTSbind91:9.9.5.dfsg-3ubuntu0.17, 1:9.9.5.dfsg-3ubuntu0.18, 0
Ubuntu:20.04:LTSbind91:9.11.5.P4+dfsg-5.1ubuntu3, 1:9.11.5.P4+dfsg-5.1ubuntu4, 1:9.11.5.P4+dfsg-5.1ubuntu5
Ubuntu:Pro:16.04:LTSbind91:9.10.3.dfsg.P4-8, 1:9.10.3.dfsg.P4-5, 1:9.10.3.dfsg.P4-4

Timeline

References

Open in Interactive Console →