ISC BIND 安全漏洞(CVE-2021-25220)

admin 2023-11-30 07:35:24 Ali_nvd 来源:ZONE.CI 全球网 0 阅读模式
中危 ISC BIND 安全漏洞(CVE-2021-25220)

CVE编号

CVE-2021-25220

利用情况

暂无

补丁情况

没有补丁

披露时间

2022-06-02
漏洞描述
ISC BIND是美国ISC公司的一套实现了DNS协议的开源软件。 ISC BIND 存在安全漏洞,该漏洞源于已经收紧了接受记录到缓存中的规则,以防止如果转发器在配置的范围之外发送记录可能会中毒。
解决建议
目前厂商暂未发布修复措施解决此安全问题,建议用户随时关注厂商主页或参考网址以获取解决办法:https://vigilance.fr/vulnerability/ISC-BIND-spoofing-via-DNS-Forwarders-Cache-Poisoning-37754
参考链接
https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf
https://kb.isc.org/v1/docs/cve-2021-25220
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedora...
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedora...
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedora...
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedora...
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedora...
https://security.gentoo.org/glsa/202210-25
https://security.netapp.com/advisory/ntap-20220408-0001/
https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-O...
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
应用 isc bind * From (including) 9.11.0 Up to (excluding) 9.11.37
运行在以下环境
应用 isc bind * From (including) 9.11.4 Up to (excluding) 9.11.37
运行在以下环境
应用 isc bind * From (including) 9.12.0 Up to (excluding) 9.16.27
运行在以下环境
应用 isc bind * From (including) 9.16.8 Up to (excluding) 9.16.27
运行在以下环境
应用 isc bind * From (including) 9.17.0 Up to (including) 9.18.0
运行在以下环境
系统 alibaba_cloud_linux_2.1903 bind-chroot * Up to (excluding) 9.11.4-26.P2.6.al7.13
运行在以下环境
系统 alpine_3.12 bind * Up to (excluding) 9.16.27-r0
运行在以下环境
系统 alpine_3.13 bind * Up to (excluding) 9.16.27-r0
运行在以下环境
系统 alpine_3.14 bind * Up to (excluding) 9.16.27-r0
运行在以下环境
系统 alpine_3.15 bind * Up to (excluding) 9.16.27-r0
运行在以下环境
系统 alpine_3.16 bind * Up to (excluding) 9.16.27-r0
运行在以下环境
系统 alpine_3.17 bind * Up to (excluding) 9.16.27-r0
运行在以下环境
系统 alpine_3.18 bind * Up to (excluding) 9.16.27-r0
运行在以下环境
系统 alpine_edge bind * Up to (excluding) 9.16.27-r0
运行在以下环境
系统 amazon_2 bind * Up to (excluding) 9.11.4-26.P2.amzn2.13
运行在以下环境
系统 amazon_2022 bind * Up to (excluding) 9.16.27-1.amzn2022.0.1
运行在以下环境
系统 amazon_2023 bind * Up to (excluding) 9.16.27-1.amzn2023.0.2
运行在以下环境
系统 anolis_os_7 bind-pkcs11-utils * Up to (excluding) 1.16.5-10
运行在以下环境
系统 anolis_os_8 bind9.16-license * Up to (excluding) 9.16.23-0.9
运行在以下环境
系统 centos_7 bind * Up to (excluding) 9.11.4-26.P2.el7_9.13
运行在以下环境
系统 centos_8 bind9.16-debugsource * Up to (excluding) 9.11.36-5.el8
运行在以下环境
系统 debian_10 bind9 * Up to (excluding) 1:9.11.5.P4+dfsg-5.1+deb10u7
运行在以下环境
系统 debian_11 bind9 * Up to (excluding) 1:9.16.27-1~deb11u1
运行在以下环境
系统 debian_12 bind9 * Up to (excluding) 1:9.18.1-1
运行在以下环境
系统 debian_9 bind9 * Up to (excluding) 1:9.10.3.dfsg.P4-12.3+deb9u11
运行在以下环境
系统 debian_sid bind9 * Up to (excluding) 1:9.18.1-1
运行在以下环境
系统 fedora_34 dhcp-client * Up to (excluding) 9.16.27-1.fc34
运行在以下环境
系统 fedora_35 dhcp-debugsource * Up to (excluding) 9.16.27-1.fc35
运行在以下环境
系统 fedora_36 dhcp-debugsource * Up to (excluding) 9.16.27-1.fc36
运行在以下环境
系统 kylinos_aarch64_V10 dhcp * Up to (excluding) 9.11.36-5.el8
运行在以下环境
系统 kylinos_aarch64_V10SP1 dhcp * Up to (excluding) 9.11.21-8.p01.ky10
运行在以下环境
系统 kylinos_aarch64_V10SP2 dhcp * Up to (excluding) 9.11.21-10.ky10
运行在以下环境
系统 kylinos_aarch64_V10SP3 dhcp * Up to (excluding) 4.4.2-9.ky10
运行在以下环境
系统 kylinos_loongarch64_V10SP1 dhcp * Up to (excluding) 9.11.21-10.a.ky10
运行在以下环境
系统 kylinos_loongarch64_V10SP3 dhcp * Up to (excluding) 4.4.2-9.a.ky10
运行在以下环境
系统 kylinos_x86_64_V10 dhcp * Up to (excluding) 9.11.36-5.el8
运行在以下环境
系统 kylinos_x86_64_V10SP1 dhcp * Up to (excluding) 9.11.21-8.p01.ky10
运行在以下环境
系统 kylinos_x86_64_V10SP2 dhcp * Up to (excluding) 9.11.21-10.ky10
运行在以下环境
系统 opensuse_Leap_15.3 libdns1605-32bit * Up to (excluding) 9.16.6-150300.22.16.1
运行在以下环境
系统 opensuse_Leap_15.4 bind-utils * Up to (excluding) 9.16.6-150000.12.60.1
运行在以下环境
系统 oracle_7 oraclelinux-release * Up to (excluding) 9.11.4-26.P2.el7_9.13
运行在以下环境
系统 oracle_8 oraclelinux-release * Up to (excluding) 9.11.36-5.el8
运行在以下环境
系统 oracle_9 oraclelinux-release * Up to (excluding) 9.16.23-5.el9_1
运行在以下环境
系统 redhat_7 bind * Up to (excluding) 9.11.4-26.P2.el7_9.13
运行在以下环境
系统 redhat_8 bind9.16-debugsource * Up to (excluding) 9.11.36-5.el8
运行在以下环境
系统 redhat_9 dhcp-debugsource * Up to (excluding) 9.16.23-5.el9_1
运行在以下环境
系统 suse_12_SP5 bind-doc * Up to (excluding) 9.11.22-3.40.1
运行在以下环境
系统 ubuntu_18.04 bind9 * Up to (excluding) 1:9.11.3+dfsg-1ubuntu1.17
运行在以下环境
系统 ubuntu_20.04 bind9 * Up to (excluding) 1:9.16.1-0ubuntu2.10
运行在以下环境
系统 ubuntu_21.10 bind9 * Up to (excluding) 1:9.16.15-1ubuntu1.2
运行在以下环境
系统 ubuntu_22.04 bind9 * Up to (excluding) 1:9.18.0-2ubuntu3
运行在以下环境
系统 unionos_a bind * Up to (excluding) bind-9.11.36-5.uelc20.3
运行在以下环境
系统 unionos_e dhcp * Up to (excluding) dhcp-4.4.2-8.uel20
阿里云评分 4.8
  • 攻击路径 远程
  • 攻击复杂度 复杂
  • 权限要求 无需权限
  • 影响范围 有限影响
  • EXP成熟度 未验证
  • 补丁情况 没有补丁
  • 数据保密性 无影响
  • 数据完整性 无影响
  • 服务器危害 无影响
  • 全网数量 N/A
CWE-ID 漏洞类型
CWE-444 HTTP请求的解释不一致性(HTTP请求私运)
NVD-CWE-noinfo
- avd.aliyun.com
weinxin
版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
N/A Ali_nvd

N/A

N/ACVE编号 CVE-2024-9120利用情况 暂无补丁情况 N/A披露时间 2024-09-23漏洞描述Use after free in Dawn
评论:0   参与:  0