In BIND 9.16.19, 9.17.16. Also, version 9.16.19-S1 of BIND Supported Preview Edition When a vulnerable version of named receives a query under the circumstances described above, the named process will terminate due to a failed assertion check. The vulnerability affects only BIND 9 releases 9.16.19, 9.17.16, and release 9.16.19-S1 of the BIND Supported Preview Edition.
Solution:
Workaround:
The product contains an assert() or similar statement that can be triggered by an attacker, which leads to an application exit or other behavior that is more severe than necessary.
Link | Tags |
---|---|
https://kb.isc.org/v1/docs/cve-2021-25218 | exploit vendor advisory |
http://www.openwall.com/lists/oss-security/2021/08/18/3 | mailing list third party advisory patch |
http://www.openwall.com/lists/oss-security/2021/08/20/2 | mailing list third party advisory patch |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZPJCLGSR4BTGFLBLGIE5TEQP2SNJKGVL/ | vendor advisory |
https://security.netapp.com/advisory/ntap-20210909-0002/ | third party advisory |