A vulnerability in BIND's GSSAPI security policy negotiation can be targeted by a buffer overflow attack
Description
BIND servers are vulnerable if they are running an affected version and are configured to use GSS-TSIG features. In a configuration which uses BIND's default settings the vulnerable code path is not exposed, but a server can be rendered vulnerable by explicitly setting valid values for the tkey-gssapi-keytab or tkey-gssapi-credentialconfiguration options. Although the default configuration is not vulnerable, GSS-TSIG is frequently used in networks where BIND is integrated with Samba, as well as in mixed-server environments that combine BIND servers with Active Directory domain controllers. The most likely outcome of a successful exploitation of the vulnerability is a crash of the named process. However, remote code execution, while unproven, is theoretically possible. Affects: BIND 9.5.0 -> 9.11.27, 9.12.0 -> 9.16.11, and versions BIND 9.11.3-S1 -> 9.11.27-S1 and 9.16.8-S1 -> 9.16.11-S1 of BIND Supported Preview Edition. Also release versions 9.17.0 -> 9.17.1 of the BIND 9.17 development branch
Affected products
51- osv-coords50 versionspkg:apk/chainguard/bindpkg:apk/chainguard/bind-devpkg:apk/chainguard/bind-dnssec-rootpkg:apk/chainguard/bind-dnssec-toolspkg:apk/chainguard/bind-docpkg:apk/chainguard/bind-libspkg:apk/chainguard/bind-pluginspkg:apk/chainguard/bind-toolspkg:apk/wolfi/bindpkg:apk/wolfi/bind-devpkg:apk/wolfi/bind-dnssec-rootpkg:apk/wolfi/bind-dnssec-toolspkg:apk/wolfi/bind-docpkg:apk/wolfi/bind-libspkg:apk/wolfi/bind-pluginspkg:apk/wolfi/bind-toolspkg:rpm/suse/bind&distro=HPE%20Helion%20OpenStack%208pkg:rpm/suse/bind&distro=SUSE%20Enterprise%20Storage%206pkg:rpm/suse/bind&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP1-ESPOSpkg:rpm/suse/bind&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP1-LTSSpkg:rpm/suse/bind&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015-ESPOSpkg:rpm/suse/bind&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015-LTSSpkg:rpm/suse/bind&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP2pkg:rpm/suse/bind&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Server%20Applications%2015%20SP2pkg:rpm/suse/bind&distro=SUSE%20Linux%20Enterprise%20Point%20of%20Sale%2011%20SP3pkg:rpm/suse/bind&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4-LTSSpkg:rpm/suse/bind&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-BCLpkg:rpm/suse/bind&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-LTSSpkg:rpm/suse/bind&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3-BCLpkg:rpm/suse/bind&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3-LTSSpkg:rpm/suse/bind&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP4-LTSSpkg:rpm/suse/bind&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5pkg:rpm/suse/bind&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP1-BCLpkg:rpm/suse/bind&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP1-LTSSpkg:rpm/suse/bind&distro=SUSE%20Linux%20Enterprise%20Server%2015-LTSSpkg:rpm/suse/bind&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2pkg:rpm/suse/bind&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3pkg:rpm/suse/bind&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP4pkg:rpm/suse/bind&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5pkg:rpm/suse/bind&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015pkg:rpm/suse/bind&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP1pkg:rpm/suse/bind&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP5pkg:rpm/suse/bind&distro=SUSE%20Manager%20Proxy%204.0pkg:rpm/suse/bind&distro=SUSE%20Manager%20Retail%20Branch%20Server%204.0pkg:rpm/suse/bind&distro=SUSE%20Manager%20Server%204.0pkg:rpm/suse/bind&distro=SUSE%20OpenStack%20Cloud%207pkg:rpm/suse/bind&distro=SUSE%20OpenStack%20Cloud%208pkg:rpm/suse/bind&distro=SUSE%20OpenStack%20Cloud%209pkg:rpm/suse/bind&distro=SUSE%20OpenStack%20Cloud%20Crowbar%208pkg:rpm/suse/bind&distro=SUSE%20OpenStack%20Cloud%20Crowbar%209
< 0+ 49 more
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 9.9.9P1-63.20.1
- (no CPE)range: < 9.16.6-12.41.1
- (no CPE)range: < 9.16.6-12.41.1
- (no CPE)range: < 9.16.6-12.41.1
- (no CPE)range: < 9.16.6-12.41.1
- (no CPE)range: < 9.16.6-12.41.1
- (no CPE)range: < 9.16.6-12.41.1
- (no CPE)range: < 9.16.6-12.41.1
- (no CPE)range: < 9.9.6P1-0.51.23.1
- (no CPE)range: < 9.9.6P1-0.51.23.1
- (no CPE)range: < 9.9.9P1-63.20.1
- (no CPE)range: < 9.9.9P1-63.20.1
- (no CPE)range: < 9.9.9P1-63.20.1
- (no CPE)range: < 9.9.9P1-63.20.1
- (no CPE)range: < 9.11.22-3.29.1
- (no CPE)range: < 9.11.22-3.29.1
- (no CPE)range: < 9.16.6-12.41.1
- (no CPE)range: < 9.16.6-12.41.1
- (no CPE)range: < 9.16.6-12.41.1
- (no CPE)range: < 9.9.9P1-63.20.1
- (no CPE)range: < 9.9.9P1-63.20.1
- (no CPE)range: < 9.11.22-3.29.1
- (no CPE)range: < 9.11.22-3.29.1
- (no CPE)range: < 9.16.6-12.41.1
- (no CPE)range: < 9.16.6-12.41.1
- (no CPE)range: < 9.11.22-3.29.1
- (no CPE)range: < 9.16.6-12.41.1
- (no CPE)range: < 9.16.6-12.41.1
- (no CPE)range: < 9.16.6-12.41.1
- (no CPE)range: < 9.9.9P1-63.20.1
- (no CPE)range: < 9.9.9P1-63.20.1
- (no CPE)range: < 9.11.22-3.29.1
- (no CPE)range: < 9.9.9P1-63.20.1
- (no CPE)range: < 9.11.22-3.29.1
- ISC/BIND9v5Range: Open Source Branches 9.5 though 9.11 9.5.0 through versions before 9.11.28
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
11- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EBTPWRQWRQEJNWY4NHO4WLS4KLJ3ERHZ/mitrevendor-advisoryx_refsource_FEDORA
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KYXAF7G45RXDVNUTWWCI2CVTHRZ67LST/mitrevendor-advisoryx_refsource_FEDORA
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QWCMBOSZOJIIET7BWTRYS3HLX5TSDKHX/mitrevendor-advisoryx_refsource_FEDORA
- www.debian.org/security/2021/dsa-4857mitrevendor-advisoryx_refsource_DEBIAN
- www.openwall.com/lists/oss-security/2021/02/19/1mitremailing-listx_refsource_MLIST
- www.openwall.com/lists/oss-security/2021/02/20/2mitremailing-listx_refsource_MLIST
- cert-portal.siemens.com/productcert/pdf/ssa-389290.pdfmitrex_refsource_CONFIRM
- kb.isc.org/v1/docs/cve-2020-8625mitrex_refsource_CONFIRM
- lists.debian.org/debian-lts-announce/2021/02/msg00029.htmlmitremailing-listx_refsource_MLIST
- security.netapp.com/advisory/ntap-20210319-0001/mitrex_refsource_CONFIRM
- www.zerodayinitiative.com/advisories/ZDI-21-195/mitrex_refsource_MISC
News mentions
0No linked articles in our index yet.