Isc

Bind

183 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.04%
  • Veröffentlicht 21.01.2026 14:43:27
  • Zuletzt bearbeitet 26.01.2026 15:04:59

Malformed BRID/HHIT records can cause `named` to terminate unexpectedly. This issue affects BIND 9 versions 9.18.40 through 9.18.43, 9.20.13 through 9.20.17, 9.21.12 through 9.21.16, 9.18.40-S1 through 9.18.43-S1, and 9.20.13-S1 through 9.20.17-S1.

  • EPSS 0.01%
  • Veröffentlicht 16.07.2025 17:38:06
  • Zuletzt bearbeitet 04.11.2025 22:16:11

If a `named` caching resolver is configured with `serve-stale-enable` `yes`, and with `stale-answer-client-timeout` set to `0` (the only allowable value other than `disabled`), and if the resolver, in the process of resolving a query, encounters a CN...

  • EPSS 0.67%
  • Veröffentlicht 29.01.2025 22:15:28
  • Zuletzt bearbeitet 11.02.2025 19:15:12

It is possible to construct a zone such that some queries to it will generate responses containing numerous records in the Additional section. An attacker sending many such queries can cause either the authoritative server itself or an independent re...

  • EPSS 0.5%
  • Veröffentlicht 29.01.2025 22:15:28
  • Zuletzt bearbeitet 07.02.2025 17:15:30

Clients using DNS-over-HTTPS (DoH) can exhaust a DNS resolver's CPU and/or memory by flooding it with crafted valid or invalid HTTP/2 traffic. This issue affects BIND 9 versions 9.18.0 through 9.18.32, 9.20.0 through 9.20.4, 9.21.0 through 9.21.3, an...

  • EPSS 0.11%
  • Veröffentlicht 23.07.2024 15:15:05
  • Zuletzt bearbeitet 21.11.2024 09:42:08

Client queries that trigger serving stale data and that also require lookups in local authoritative zone data may result in an assertion failure. This issue affects BIND 9 versions 9.16.13 through 9.16.50, 9.18.0 through 9.18.27, 9.19.0 through 9.19....

  • EPSS 16.69%
  • Veröffentlicht 23.07.2024 15:15:03
  • Zuletzt bearbeitet 21.11.2024 08:47:18

A malicious client can send many DNS messages over TCP, potentially causing the server to become unstable while the attack is in progress. The server may recover after the attack ceases. Use of ACLs will not mitigate the attack. This issue affects B...

  • EPSS 0.17%
  • Veröffentlicht 23.07.2024 15:15:03
  • Zuletzt bearbeitet 21.11.2024 08:51:11

Resolver caches and authoritative zone databases that hold significant numbers of RRs for the same hostname (of any RTYPE) can suffer from degraded performance as content is being added or updated, and also when handling client queries for this name....

  • EPSS 0.14%
  • Veröffentlicht 23.07.2024 15:15:03
  • Zuletzt bearbeitet 21.11.2024 08:51:43

If a server hosts a zone containing a "KEY" Resource Record, or a resolver DNSSEC-validates a "KEY" Resource Record from a DNSSEC-signed domain in cache, a client can exhaust resolver CPU resources by sending a stream of SIG(0) signed requests. This ...

Medienbericht
  • EPSS 44.43%
  • Veröffentlicht 14.02.2024 16:15:45
  • Zuletzt bearbeitet 04.11.2025 19:16:14

Certain DNSSEC aspects of the DNS protocol (in RFC 4033, 4034, 4035, 6840, and related RFCs) allow remote attackers to cause a denial of service (CPU consumption) via one or more DNSSEC responses, aka the "KeyTrap" issue. One of the concerns is that,...

Medienbericht Exploit
  • EPSS 13.77%
  • Veröffentlicht 14.02.2024 16:15:45
  • Zuletzt bearbeitet 23.12.2025 20:20:08

The Closest Encloser Proof aspect of the DNS protocol (in RFC 5155 when RFC 9276 guidance is skipped) allows remote attackers to cause a denial of service (CPU consumption for SHA-1 computations) via DNSSEC responses in a random subdomain attack, aka...