Isc

Bind

183 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.18%
  • Veröffentlicht 13.02.2024 14:15:46
  • Zuletzt bearbeitet 21.11.2024 08:44:00

To keep its cache database efficient, `named` running as a recursive resolver occasionally attempts to clean up the database. It uses several methods, including some that are asynchronous: a small chunk of memory pointing to the cache element that ca...

  • EPSS 0.21%
  • Veröffentlicht 13.02.2024 14:15:45
  • Zuletzt bearbeitet 14.03.2025 17:15:40

The DNS message parsing code in `named` includes a section whose computational complexity is overly high. It does not cause problems for typical DNS traffic, but crafted queries and responses may cause excessive CPU load on the affected `named` insta...

  • EPSS 0.14%
  • Veröffentlicht 13.02.2024 14:15:45
  • Zuletzt bearbeitet 21.11.2024 08:41:55

A flaw in query-handling code can cause `named` to exit prematurely with an assertion failure when: - `nxdomain-redirect <domain>;` is configured, and - the resolver receives a PTR query for an RFC 1918 address that would normally result in an a...

  • EPSS 0.14%
  • Veröffentlicht 13.02.2024 14:15:45
  • Zuletzt bearbeitet 29.03.2025 00:15:16

A bad interaction between DNS64 and serve-stale may cause `named` to crash with an assertion failure during recursive resolution, when both of these features are enabled. This issue affects BIND 9 versions 9.16.12 through 9.16.45, 9.18.0 through 9.18...

  • EPSS 0.11%
  • Veröffentlicht 13.02.2024 14:15:45
  • Zuletzt bearbeitet 21.11.2024 08:42:15

If a resolver cache has a very large number of ECS records stored for the same name, the process of cleaning the cache database node for this name can significantly impair query performance. This issue affects BIND 9 versions 9.11.3-S1 through 9.11....

  • EPSS 0.18%
  • Veröffentlicht 20.09.2023 13:15:12
  • Zuletzt bearbeitet 21.11.2024 08:34:41

A flaw in the networking code handling DNS-over-TLS queries may cause `named` to terminate unexpectedly due to an assertion failure. This happens when internal data structures are incorrectly reused under significant DNS-over-TLS query load. This iss...

  • EPSS 0.19%
  • Veröffentlicht 20.09.2023 13:15:11
  • Zuletzt bearbeitet 02.12.2025 21:15:51

The code that processes control channel messages sent to `named` calls certain functions recursively during packet parsing. Recursion depth is only limited by the maximum accepted packet size; depending on the environment, this may cause the packet-p...

  • EPSS 0.39%
  • Veröffentlicht 21.06.2023 17:15:47
  • Zuletzt bearbeitet 21.11.2024 07:59:22

Every `named` instance configured to run as a recursive resolver maintains a cache database holding the responses to the queries it has recently sent to authoritative servers. The size limit for that cache database can be configured using the `max-ca...

  • EPSS 0.07%
  • Veröffentlicht 21.06.2023 17:15:47
  • Zuletzt bearbeitet 21.11.2024 07:59:22

A `named` instance configured to run as a DNSSEC-validating recursive resolver with the Aggressive Use of DNSSEC-Validated Cache (RFC 8198) option (`synth-from-dnssec`) enabled can be remotely terminated using a zone with a malformed NSEC record. Thi...

  • EPSS 0.19%
  • Veröffentlicht 21.06.2023 17:15:47
  • Zuletzt bearbeitet 21.11.2024 07:59:33

If the `recursive-clients` quota is reached on a BIND 9 resolver configured with both `stale-answer-enable yes;` and `stale-answer-client-timeout 0;`, a sequence of serve-stale-related lookups could cause `named` to loop and terminate unexpectedly du...