In BIND 9.5.0 -> 9.11.29, 9.12.0 -> 9.16.13, and versions BIND 9.11.3-S1 -> 9.11.29-S1 and 9.16.8-S1 -> 9.16.13-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -> 9.17.1 of the BIND 9.17 development branch, BIND servers are vulnerable if they are running an affected version and are configured to use GSS-TSIG features. In a configuration which uses BIND's default settings the vulnerable code path is not exposed, but a server can be rendered vulnerable by explicitly setting values for the tkey-gssapi-keytab or tkey-gssapi-credential configuration options. Although the default configuration is not vulnerable, GSS-TSIG is frequently used in networks where BIND is integrated with Samba, as well as in mixed-server environments that combine BIND servers with Active Directory domain controllers. For servers that meet these conditions, the ISC SPNEGO implementation is vulnerable to various attacks, depending on the CPU architecture for which BIND was built: For named binaries compiled for 64-bit platforms, this flaw can be used to trigger a buffer over-read, leading to a server crash. For named binaries compiled for 32-bit platforms, this flaw can be used to trigger a server crash due to a buffer overflow and possibly also to achieve remote code execution. We have determined that standard SPNEGO implementations are available in the MIT and Heimdal Kerberos libraries, which support a broad range of operating systems, rendering the ISC implementation unnecessary and obsolete. Therefore, to reduce the attack surface for BIND users, we will be removing the ISC SPNEGO implementation in the April releases of BIND 9.11 and 9.16 (it had already been dropped from BIND 9.17). We would not normally remove something from a stable ESV (Extended Support Version) of BIND, but since system libraries can replace the ISC SPNEGO implementation, we have made an exception in this case for reasons of stability and security.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2021/04/29/1 | Mailing List Third Party Advisory |
http://www.openwall.com/lists/oss-security/2021/04/29/2 | Mailing List Third Party Advisory |
http://www.openwall.com/lists/oss-security/2021/04/29/3 | Mailing List Third Party Advisory |
http://www.openwall.com/lists/oss-security/2021/04/29/4 | Mailing List Third Party Advisory |
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf | Patch Third Party Advisory |
https://kb.isc.org/v1/docs/cve-2021-25215 | Not Applicable |
https://lists.debian.org/debian-lts-announce/2021/05/msg00001.html | Mailing List Third Party Advisory |
https://security.netapp.com/advisory/ntap-20210521-0006/ | Third Party Advisory |
https://www.debian.org/security/2021/dsa-4909 | Third Party Advisory |
https://www.zerodayinitiative.com/advisories/ZDI-21-657/ | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
Configuration 8 (hide)
AND |
|
Configuration 9 (hide)
AND |
|
Configuration 10 (hide)
AND |
|
Configuration 11 (hide)
AND |
|
Configuration 12 (hide)
AND |
|
Configuration 13 (hide)
AND |
|
History
03 May 2022, 16:04
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-125 |
25 Apr 2022, 20:02
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-190 | |
References | (CONFIRM) https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf - Patch, Third Party Advisory | |
References | (CONFIRM) https://security.netapp.com/advisory/ntap-20210521-0006/ - Third Party Advisory | |
References | (MISC) https://www.zerodayinitiative.com/advisories/ZDI-21-657/ - Third Party Advisory, VDB Entry | |
First Time |
Netapp h300e
Siemens Netapp aff A250 Firmware Netapp h410s Netapp aff 500f Netapp h410s Firmware Netapp h700s Netapp Netapp aff A250 Netapp h500e Firmware Netapp h700e Firmware Netapp h300e Firmware Netapp h500s Firmware Netapp cloud Backup Netapp h300s Firmware Netapp h700s Firmware Siemens sinec Infrastructure Network Services Netapp active Iq Unified Manager Netapp h500e Netapp h700e Netapp aff 500f Firmware Netapp h500s Netapp h300s |
|
CPE | cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:aff_a250_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:h500e:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:h300e:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:aff_a250:-:*:*:*:*:*:*:* cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:h500e_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:h700e:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:* cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vsphere:*:* cpe:2.3:o:netapp:h300e_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:aff_500f:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:h700e_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:* cpe:2.3:a:siemens:sinec_infrastructure_network_services:*:*:*:*:*:*:*:* cpe:2.3:o:netapp:aff_500f_firmware:-:*:*:*:*:*:*:* |
10 Mar 2022, 17:42
Type | Values Removed | Values Added |
---|---|---|
References |
|
07 Jun 2021, 14:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
21 May 2021, 09:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
12 May 2021, 17:09
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-617 | |
CPE | cpe:2.3:a:isc:bind:9.11.7:s1:*:*:supported_preview:*:*:* cpe:2.3:a:isc:bind:9.11.27:s1:*:*:supported_preview:*:*:* cpe:2.3:a:isc:bind:9.11.21:s1:*:*:supported_preview:*:*:* cpe:2.3:a:isc:bind:9.16.8:s1:*:*:supported_preview:*:*:* cpe:2.3:a:isc:bind:9.9.13:s1:*:*:supported_preview:*:*:* cpe:2.3:a:isc:bind:9.10.5:s1:*:*:supported_preview:*:*:* cpe:2.3:a:isc:bind:9.11.29:s1:*:*:supported_preview:*:*:* cpe:2.3:a:isc:bind:9.11.12:s1:*:*:supported_preview:*:*:* cpe:2.3:a:isc:bind:9.11.6:s1:*:*:supported_preview:*:*:* cpe:2.3:a:isc:bind:9.11.5:s6:*:*:supported_preview:*:*:* cpe:2.3:a:isc:bind:9.9.12:s1:*:*:supported_preview:*:*:* cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* cpe:2.3:a:isc:bind:9.10.7:s1:*:*:supported_preview:*:*:* cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* cpe:2.3:a:isc:bind:*:*:*:*:-:*:*:* cpe:2.3:a:isc:bind:9.11.5:s5:*:*:supported_preview:*:*:* cpe:2.3:a:isc:bind:9.9.3:s1:*:*:supported_preview:*:*:* cpe:2.3:a:isc:bind:9.16.13:s1:*:*:supported_preview:*:*:* cpe:2.3:a:isc:bind:9.11.3:s1:*:*:supported_preview:*:*:* cpe:2.3:a:isc:bind:9.11.8:s1:*:*:supported_preview:*:*:* cpe:2.3:a:isc:bind:9.16.11:s1:*:*:supported_preview:*:*:* cpe:2.3:a:isc:bind:9.11.5:s3:*:*:supported_preview:*:*:* |
|
References | (MLIST) http://www.openwall.com/lists/oss-security/2021/04/29/3 - Mailing List, Third Party Advisory | |
References | (MLIST) https://lists.debian.org/debian-lts-announce/2021/05/msg00001.html - Mailing List, Third Party Advisory | |
References | (DEBIAN) https://www.debian.org/security/2021/dsa-4909 - Third Party Advisory | |
References | (CONFIRM) https://kb.isc.org/v1/docs/cve-2021-25215 - Not Applicable | |
References | (MLIST) http://www.openwall.com/lists/oss-security/2021/04/29/1 - Mailing List, Third Party Advisory | |
References | (MLIST) http://www.openwall.com/lists/oss-security/2021/04/29/2 - Mailing List, Third Party Advisory | |
References | (MLIST) http://www.openwall.com/lists/oss-security/2021/04/29/4 - Mailing List, Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : 6.8
v3 : 9.8 |
04 May 2021, 14:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
01 May 2021, 17:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
29 Apr 2021, 18:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
29 Apr 2021, 15:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
29 Apr 2021, 03:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-04-29 01:15
Updated : 2023-12-10 13:55
NVD link : CVE-2021-25216
Mitre link : CVE-2021-25216
CVE.ORG link : CVE-2021-25216
JSON object : View
Products Affected
netapp
- h700s_firmware
- h700e
- active_iq_unified_manager
- h700e_firmware
- h700s
- h300s_firmware
- cloud_backup
- h300s
- h300e
- h500e_firmware
- aff_a250_firmware
- h500s
- h410s
- aff_a250
- aff_500f_firmware
- h410s_firmware
- h500s_firmware
- h300e_firmware
- h500e
- aff_500f
debian
- debian_linux
isc
- bind
siemens
- sinec_infrastructure_network_services
CWE
CWE-125
Out-of-bounds Read