CVE-2021-25219
MEDIUM
Published 2021-10-27T21:10:10.088929Z
Actions:
CVSS Score
V3.1
5.3
/10
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Base Score Metrics
Exploitability: N/A
Impact: N/A
EPSS Score
v2023.03.01
0.006
probability
of exploitation in the wild
There is a 0.6% chance that this vulnerability will be exploited in the wild within the next 30 days.
Updated: 2025-01-25
Exploit Probability
Percentile: 0.786
Higher than 78.6% of all CVEs
Attack Vector Metrics
Impact Metrics
Description
In BIND 9.3.0 -> 9.11.35, 9.12.0 -> 9.16.21, and versions 9.9.3-S1 -> 9.11.35-S1 and 9.16.8-S1 -> 9.16.21-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -> 9.17.18 of the BIND 9.17 development branch, exploitation of broken authoritative servers using a flaw in response processing can cause degradation in BIND resolver performance. The way the lame cache is currently designed makes it possible for its internal data structures to grow almost infinitely, which may cause significant delays in client query processing.
Available Exploits
No exploits available for this CVE.
Related News
No news articles found for this CVE.
Affected Products
Affected Versions:
Open Source Branches 9.3 through 9.11 9.3.0 through versions before 9.11.36
Open Source Branches 9.12 through 9.16 9.12.0 through versions before 9.16.22
Supported Preview Branches 9.9-S through 9.11-S 9.9.3-S1 through versions before 9.11.36-S1
Supported Preview Branch 9.16-S 9.16.8-S1 through versions before 9.16.22-S1
Development Branch 9.17 9.17.0 through versions before 9.17.19
References
Published: 2021-10-27T21:10:10.088929Z
Last Modified: 2024-09-16T17:33:38.865Z
Copied to clipboard!