中危 ISC BIND 安全漏洞(CVE-2021-25220)
CVE编号
CVE-2021-25220利用情况
暂无补丁情况
没有补丁披露时间
2022-06-02漏洞描述
ISC BIND是美国ISC公司的一套实现了DNS协议的开源软件。 ISC BIND 存在安全漏洞,该漏洞源于已经收紧了接受记录到缓存中的规则,以防止如果转发器在配置的范围之外发送记录可能会中毒。解决建议
目前厂商暂未发布修复措施解决此安全问题,建议用户随时关注厂商主页或参考网址以获取解决办法:https://vigilance.fr/vulnerability/ISC-BIND-spoofing-via-DNS-Forwarders-Cache-Poisoning-37754受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | isc | bind | * | From (including) 9.11.0 | Up to (excluding) 9.11.37 | ||||
运行在以下环境 | |||||||||
应用 | isc | bind | * | From (including) 9.11.4 | Up to (excluding) 9.11.37 | ||||
运行在以下环境 | |||||||||
应用 | isc | bind | * | From (including) 9.12.0 | Up to (excluding) 9.16.27 | ||||
运行在以下环境 | |||||||||
应用 | isc | bind | * | From (including) 9.16.8 | Up to (excluding) 9.16.27 | ||||
运行在以下环境 | |||||||||
应用 | isc | bind | * | From (including) 9.17.0 | Up to (including) 9.18.0 | ||||
运行在以下环境 | |||||||||
系统 | alibaba_cloud_linux_2.1903 | bind-chroot | * | Up to (excluding) 9.11.4-26.P2.6.al7.13 | |||||
运行在以下环境 | |||||||||
系统 | alpine_3.12 | bind | * | Up to (excluding) 9.16.27-r0 | |||||
运行在以下环境 | |||||||||
系统 | alpine_3.13 | bind | * | Up to (excluding) 9.16.27-r0 | |||||
运行在以下环境 | |||||||||
系统 | alpine_3.14 | bind | * | Up to (excluding) 9.16.27-r0 | |||||
运行在以下环境 | |||||||||
系统 | alpine_3.15 | bind | * | Up to (excluding) 9.16.27-r0 | |||||
运行在以下环境 | |||||||||
系统 | alpine_3.16 | bind | * | Up to (excluding) 9.16.27-r0 | |||||
运行在以下环境 | |||||||||
系统 | alpine_3.17 | bind | * | Up to (excluding) 9.16.27-r0 | |||||
运行在以下环境 | |||||||||
系统 | alpine_3.18 | bind | * | Up to (excluding) 9.16.27-r0 | |||||
运行在以下环境 | |||||||||
系统 | alpine_edge | bind | * | Up to (excluding) 9.16.27-r0 | |||||
运行在以下环境 | |||||||||
系统 | amazon_2 | bind | * | Up to (excluding) 9.11.4-26.P2.amzn2.13 | |||||
运行在以下环境 | |||||||||
系统 | amazon_2022 | bind | * | Up to (excluding) 9.16.27-1.amzn2022.0.1 | |||||
运行在以下环境 | |||||||||
系统 | amazon_2023 | bind | * | Up to (excluding) 9.16.27-1.amzn2023.0.2 | |||||
运行在以下环境 | |||||||||
系统 | anolis_os_7 | bind-pkcs11-utils | * | Up to (excluding) 1.16.5-10 | |||||
运行在以下环境 | |||||||||
系统 | anolis_os_8 | bind9.16-license | * | Up to (excluding) 9.16.23-0.9 | |||||
运行在以下环境 | |||||||||
系统 | centos_7 | bind | * | Up to (excluding) 9.11.4-26.P2.el7_9.13 | |||||
运行在以下环境 | |||||||||
系统 | centos_8 | bind9.16-debugsource | * | Up to (excluding) 9.11.36-5.el8 | |||||
运行在以下环境 | |||||||||
系统 | debian_10 | bind9 | * | Up to (excluding) 1:9.11.5.P4+dfsg-5.1+deb10u7 | |||||
运行在以下环境 | |||||||||
系统 | debian_11 | bind9 | * | Up to (excluding) 1:9.16.27-1~deb11u1 | |||||
运行在以下环境 | |||||||||
系统 | debian_12 | bind9 | * | Up to (excluding) 1:9.18.1-1 | |||||
运行在以下环境 | |||||||||
系统 | debian_9 | bind9 | * | Up to (excluding) 1:9.10.3.dfsg.P4-12.3+deb9u11 | |||||
运行在以下环境 | |||||||||
系统 | debian_sid | bind9 | * | Up to (excluding) 1:9.18.1-1 | |||||
运行在以下环境 | |||||||||
系统 | fedora_34 | dhcp-client | * | Up to (excluding) 9.16.27-1.fc34 | |||||
运行在以下环境 | |||||||||
系统 | fedora_35 | dhcp-debugsource | * | Up to (excluding) 9.16.27-1.fc35 | |||||
运行在以下环境 | |||||||||
系统 | fedora_36 | dhcp-debugsource | * | Up to (excluding) 9.16.27-1.fc36 | |||||
运行在以下环境 | |||||||||
系统 | kylinos_aarch64_V10 | dhcp | * | Up to (excluding) 9.11.36-5.el8 | |||||
运行在以下环境 | |||||||||
系统 | kylinos_aarch64_V10SP1 | dhcp | * | Up to (excluding) 9.11.21-8.p01.ky10 | |||||
运行在以下环境 | |||||||||
系统 | kylinos_aarch64_V10SP2 | dhcp | * | Up to (excluding) 9.11.21-10.ky10 | |||||
运行在以下环境 | |||||||||
系统 | kylinos_aarch64_V10SP3 | dhcp | * | Up to (excluding) 4.4.2-9.ky10 | |||||
运行在以下环境 | |||||||||
系统 | kylinos_loongarch64_V10SP1 | dhcp | * | Up to (excluding) 9.11.21-10.a.ky10 | |||||
运行在以下环境 | |||||||||
系统 | kylinos_loongarch64_V10SP3 | dhcp | * | Up to (excluding) 4.4.2-9.a.ky10 | |||||
运行在以下环境 | |||||||||
系统 | kylinos_x86_64_V10 | dhcp | * | Up to (excluding) 9.11.36-5.el8 | |||||
运行在以下环境 | |||||||||
系统 | kylinos_x86_64_V10SP1 | dhcp | * | Up to (excluding) 9.11.21-8.p01.ky10 | |||||
运行在以下环境 | |||||||||
系统 | kylinos_x86_64_V10SP2 | dhcp | * | Up to (excluding) 9.11.21-10.ky10 | |||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_15.3 | libdns1605-32bit | * | Up to (excluding) 9.16.6-150300.22.16.1 | |||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_15.4 | bind-utils | * | Up to (excluding) 9.16.6-150000.12.60.1 | |||||
运行在以下环境 | |||||||||
系统 | oracle_7 | oraclelinux-release | * | Up to (excluding) 9.11.4-26.P2.el7_9.13 | |||||
运行在以下环境 | |||||||||
系统 | oracle_8 | oraclelinux-release | * | Up to (excluding) 9.11.36-5.el8 | |||||
运行在以下环境 | |||||||||
系统 | oracle_9 | oraclelinux-release | * | Up to (excluding) 9.16.23-5.el9_1 | |||||
运行在以下环境 | |||||||||
系统 | redhat_7 | bind | * | Up to (excluding) 9.11.4-26.P2.el7_9.13 | |||||
运行在以下环境 | |||||||||
系统 | redhat_8 | bind9.16-debugsource | * | Up to (excluding) 9.11.36-5.el8 | |||||
运行在以下环境 | |||||||||
系统 | redhat_9 | dhcp-debugsource | * | Up to (excluding) 9.16.23-5.el9_1 | |||||
运行在以下环境 | |||||||||
系统 | suse_12_SP5 | bind-doc | * | Up to (excluding) 9.11.22-3.40.1 | |||||
运行在以下环境 | |||||||||
系统 | ubuntu_18.04 | bind9 | * | Up to (excluding) 1:9.11.3+dfsg-1ubuntu1.17 | |||||
运行在以下环境 | |||||||||
系统 | ubuntu_20.04 | bind9 | * | Up to (excluding) 1:9.16.1-0ubuntu2.10 | |||||
运行在以下环境 | |||||||||
系统 | ubuntu_21.10 | bind9 | * | Up to (excluding) 1:9.16.15-1ubuntu1.2 | |||||
运行在以下环境 | |||||||||
系统 | ubuntu_22.04 | bind9 | * | Up to (excluding) 1:9.18.0-2ubuntu3 | |||||
运行在以下环境 | |||||||||
系统 | unionos_a | bind | * | Up to (excluding) bind-9.11.36-5.uelc20.3 | |||||
运行在以下环境 | |||||||||
系统 | unionos_e | dhcp | * | Up to (excluding) dhcp-4.4.2-8.uel20 | |||||
- 攻击路径 远程
- 攻击复杂度 复杂
- 权限要求 无需权限
- 影响范围 有限影响
- EXP成熟度 未验证
- 补丁情况 没有补丁
- 数据保密性 无影响
- 数据完整性 无影响
- 服务器危害 无影响
- 全网数量 N/A
CWE-ID | 漏洞类型 |
CWE-444 | HTTP请求的解释不一致性(HTTP请求私运) |
NVD-CWE-noinfo |
Exp相关链接

版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
评论