CVE-2022-0635
- EPSS 0.78%
- Published 23.03.2022 12:15:07
- Last modified 21.11.2024 06:39:04
Versions affected: BIND 9.18.0 When a vulnerable version of named receives a series of specific queries, the named process will eventually terminate due to a failed assertion check.
CVE-2022-0396
- EPSS 0.01%
- Published 23.03.2022 11:15:08
- Last modified 21.11.2024 06:38:32
BIND 9.16.11 -> 9.16.26, 9.17.0 -> 9.18.0 and versions 9.16.11-S1 -> 9.16.26-S1 of the BIND Supported Preview Edition. Specifically crafted TCP streams can cause connections to BIND to remain in CLOSE_WAIT status for an indefinite period of time, eve...
CVE-2022-0667
- EPSS 0.69%
- Published 22.03.2022 12:15:08
- Last modified 21.11.2024 06:39:08
When the vulnerability is triggered the BIND process will exit. BIND 9.18.0
CVE-2021-25219
- EPSS 0.52%
- Published 27.10.2021 21:15:07
- Last modified 21.11.2024 05:54:34
In BIND 9.3.0 -> 9.11.35, 9.12.0 -> 9.16.21, and versions 9.9.3-S1 -> 9.11.35-S1 and 9.16.8-S1 -> 9.16.21-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -> 9.17.18 of the BIND 9.17 development branch, exploitation of broken ...
CVE-2021-25218
- EPSS 0.4%
- Published 18.08.2021 19:15:07
- Last modified 21.11.2024 05:54:34
In BIND 9.16.19, 9.17.16. Also, version 9.16.19-S1 of BIND Supported Preview Edition When a vulnerable version of named receives a query under the circumstances described above, the named process will terminate due to a failed assertion check. The vu...
CVE-2021-25215
- EPSS 1.77%
- Published 29.04.2021 01:15:08
- Last modified 21.11.2024 05:54:33
In BIND 9.0.0 -> 9.11.29, 9.12.0 -> 9.16.13, and versions BIND 9.9.3-S1 -> 9.11.29-S1 and 9.16.8-S1 -> 9.16.13-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -> 9.17.11 of the BIND 9.17 development branch, when a vulnerable ...
CVE-2021-25216
- EPSS 20.5%
- Published 29.04.2021 01:15:08
- Last modified 21.11.2024 05:54:33
In BIND 9.5.0 -> 9.11.29, 9.12.0 -> 9.16.13, and versions BIND 9.11.3-S1 -> 9.11.29-S1 and 9.16.8-S1 -> 9.16.13-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -> 9.17.1 of the BIND 9.17 development branch, BIND servers are v...
CVE-2021-25214
- EPSS 0.71%
- Published 29.04.2021 01:15:07
- Last modified 21.11.2024 05:54:33
In BIND 9.8.5 -> 9.8.8, 9.9.3 -> 9.11.29, 9.12.0 -> 9.16.13, and versions BIND 9.9.3-S1 -> 9.11.29-S1 and 9.16.8-S1 -> 9.16.13-S1 of BIND 9 Supported Preview Edition, as well as release versions 9.17.0 -> 9.17.11 of the BIND 9.17 development branch, ...
CVE-2020-8625
- EPSS 1.8%
- Published 17.02.2021 23:15:13
- Last modified 21.11.2024 05:39:09
BIND servers are vulnerable if they are running an affected version and are configured to use GSS-TSIG features. In a configuration which uses BIND's default settings the vulnerable code path is not exposed, but a server can be rendered vulnerable by...
CVE-2020-8620
- EPSS 7.29%
- Published 21.08.2020 21:15:12
- Last modified 21.11.2024 05:39:08
In BIND 9.15.6 -> 9.16.5, 9.17.0 -> 9.17.3, An attacker who can establish a TCP connection with the server and send data on that connection can exploit this to trigger the assertion failure, causing the server to exit.