Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

CVE ID:CVE-2021-25219
Description:In BIND 9.3.0 -> 9.11.35, 9.12.0 -> 9.16.21, and versions 9.9.3-S1 -> 9.11.35-S1 and 9.16.8-S1 -> 9.16.21-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -> 9.17.18 of the BIND 9.17 development branch, exploitation of broken authoritative servers using a flaw in response processing can cause degradation in BIND resolver performance. The way the lame cache is currently designed makes it possible for its internal data structures to grow almost infinitely, which may cause significant delays in client query processing.
Test IDs: 1.3.6.1.4.1.25623.1.1.4.2021.3657.1   1.3.6.1.4.1.25623.1.0.854316   1.3.6.1.4.1.25623.1.1.2.2022.1705   1.3.6.1.4.1.25623.1.0.819114   1.3.6.1.4.1.25623.1.1.2.2023.1062   1.3.6.1.4.1.25623.1.1.2.2022.2486   1.3.6.1.4.1.25623.1.0.819138   1.3.6.1.4.1.25623.1.1.2.2022.1368   1.3.6.1.4.1.25623.1.0.819174   1.3.6.1.4.1.25623.1.1.13.2021.300.01   1.3.6.1.4.1.25623.1.0.117759   1.3.6.1.4.1.25623.1.0.854318   1.3.6.1.4.1.25623.1.1.2.2022.1001   1.3.6.1.4.1.25623.1.0.892807   1.3.6.1.4.1.25623.1.1.12.2021.5126.2   1.3.6.1.4.1.25623.1.1.2.2022.1261   1.3.6.1.4.1.25623.1.0.819121   1.3.6.1.4.1.25623.1.0.819122   1.3.6.1.4.1.25623.1.1.4.2022.0151.1   1.3.6.1.4.1.25623.1.0.854431   1.3.6.1.4.1.25623.1.1.4.2021.3773.1   1.3.6.1.4.1.25623.1.1.10.2021.0560   1.3.6.1.4.1.25623.1.1.2.2022.1021   1.3.6.1.4.1.25623.1.1.2.2022.1237   1.3.6.1.4.1.25623.1.1.2.2022.1394   1.3.6.1.4.1.25623.1.1.2.2022.1249   1.3.6.1.4.1.25623.1.0.704994   1.3.6.1.4.1.25623.1.1.2.2022.1685   1.3.6.1.4.1.25623.1.0.845116  
Cross References: Common Vulnerability Exposure (CVE) ID: CVE-2021-25219
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://kb.isc.org/v1/docs/cve-2021-25219
https://security.netapp.com/advisory/ntap-20211118-0002/
Debian Security Information: DSA-4994 (Google Search)
https://www.debian.org/security/2021/dsa-4994
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YGV7SA27CTYLGFJSPUM3V36ZWK7WWDI4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YTKC4E3HUOLYN5IA4EBL4VAQSWG2ZVTX/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EF4NAVRV4H3W4GA3LGGZYUKD3HSJBAVW/
https://security.gentoo.org/glsa/202210-25
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://lists.debian.org/debian-lts-announce/2021/11/msg00001.html




© 1998-2025 E-Soft Inc. All rights reserved.