7.5
CVSSv3

CVE-2021-25218

Published: 18/08/2021 Updated: 07/11/2023
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

In BIND 9.16.19, 9.17.16. Also, version 9.16.19-S1 of BIND Supported Preview Edition When a vulnerable version of named receives a query under the circumstances described above, the named process will terminate due to a failed assertion check. The vulnerability affects only BIND 9 releases 9.16.19, 9.17.16, and release 9.16.19-S1 of the BIND Supported Preview Edition.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

isc bind 9.17.16

isc bind 9.16.19

fedoraproject fedora 34

Vendor Advisories

In BIND 91619, 91716 Also, version 91619-S1 of BIND Supported Preview Edition When a vulnerable version of named receives a query under the circumstances described above, the named process will terminate due to a failed assertion check The vulnerability affects only BIND 9 releases 91619, 91716, and release 91619-S1 of the BIND Suppor ...
In BIND before version 91620, if "named" attempts to respond over UDP with a response that is larger than the current effective interface maximum transmission unit (MTU), and if response-rate limiting (RRL) is active, an assertion failure is triggered (resulting in termination of the "named" server process) ...