Unknown
CVE-2021-25215
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
CVE-2021-25215
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
In BIND 9.0.0 –> 9.11.29, 9.12.0 –> 9.16.13, and versions BIND 9.9.3-S1 –> 9.11.29-S1 and 9.16.8-S1 –> 9.16.13-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 –> 9.17.11 of the BIND 9.17 development branch, when a vulnerable version of named receives a query for a record triggering the flaw described above, the named process will terminate due to a failed assertion check. The vulnerability affects all currently maintained BIND 9 branches (9.11, 9.11-S, 9.16, 9.16-S, 9.17) as well as all other versions of BIND 9.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
- debian,
- fedoraproject,
- isc,
- netapp,
- oracle,
- siemens
Products
- 500f firmware -,
- a250 firmware -,
- active iq unified manager -,
- bind,
- bind 9.10.5,
- bind 9.10.7,
- bind 9.11.12,
- bind 9.11.21,
- bind 9.11.27,
- bind 9.11.29,
- bind 9.11.3,
- bind 9.11.5,
- bind 9.11.6,
- bind 9.11.7,
- bind 9.11.8,
- bind 9.16.11,
- bind 9.16.13,
- bind 9.16.8,
- bind 9.9.12,
- bind 9.9.13,
- bind 9.9.3,
- cloud backup -,
- debian linux 10.0,
- debian linux 9.0,
- fedora 33,
- fedora 34,
- h300e firmware -,
- h300s firmware -,
- h410s firmware -,
- h500e firmware -,
- h500s firmware -,
- h700e firmware -,
- h700s firmware -,
- sinec infrastructure network services,
- tekelec platform distribution
References
Advisory
Miscellaneous
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: