漏洞信息详情
ISC BIND 安全漏洞
漏洞简介
ISC BIND是美国ISC公司的一套实现了DNS协议的开源软件。
BIND 存在安全漏洞,该漏洞源于回答DNAME的查询时,断言检查可能会失败 需要处理DNAME才能解决的记录。
漏洞公告
目前厂商已发布升级补丁以修复漏洞,补丁获取链接:
https://kb.isc.org/v1/docs/cve-2021-25215
参考网址
来源:DEBIAN
链接:https://www.debian.org/security/2021/dsa-4909
来源:MLIST
链接:http://www.openwall.com/lists/oss-security/2021/04/29/4
来源:FEDORA
链接:https://lists.fedoraproject.org/archives/list/[email protected]/message/VEC2XG4Q2ODTN2C4CGXEIXU3EUTBMK7L/
来源:MLIST
链接:http://www.openwall.com/lists/oss-security/2021/04/29/3
来源:MLIST
链接:https://lists.debian.org/debian-lts-announce/2021/05/msg00001.html
来源:CONFIRM
链接:https://kb.isc.org/v1/docs/cve-2021-25215
来源:CONFIRM
链接:https://security.netapp.com/advisory/ntap-20210521-0006/
来源:MLIST
链接:http://www.openwall.com/lists/oss-security/2021/04/29/2
来源:MLIST
链接:http://www.openwall.com/lists/oss-security/2021/04/29/1
来源:FEDORA
链接:https://lists.fedoraproject.org/archives/list/[email protected]/message/ZDSRPCJQ7MZC6CENH5PO3VQOFI7VSWBE/
来源:vigilance.fr
链接:https://vigilance.fr/vulnerability/ISC-BIND-assertion-error-via-DNAME-35202
来源:www.cybersecurity-help.cz
链接:https://www.cybersecurity-help.cz/vdb/SB2021053006
来源:www.oracle.com
链接:https://www.oracle.com/security-alerts/cpuoct2021.html
来源:www.cybersecurity-help.cz
链接:https://www.cybersecurity-help.cz/vdb/SB2021042928
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.1866
来源:www.cybersecurity-help.cz
链接:https://www.cybersecurity-help.cz/vdb/SB2021071313
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.2711
来源:www.ibm.com
链接:https://www.ibm.com/blogs/psirt/security-bulletin-vulnerability-in-bind-cve-2021-25215/
来源:www.ibm.com
链接:https://www.ibm.com/blogs/psirt/security-bulletin-bind-for-ibm-i-is-affected-by-cve-2021-25214-and-cve-2021-25215/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.1494
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.2781
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.1675
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.2180
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/162396/Red-Hat-Security-Advisory-2021-1469-01.html
来源:www.ibm.com
链接:https://www.ibm.com/blogs/psirt/security-bulletin-vulnerability-in-bind-affects-aix-cve-2021-25215/
来源:www.ibm.com
链接:https://www.ibm.com/support/pages/node/6517664
来源:www.cybersecurity-help.cz
链接:https://www.cybersecurity-help.cz/vdb/SB2021052222
来源:www.cybersecurity-help.cz
链接:https://www.cybersecurity-help.cz/vdb/SB2021050323
来源:www.ibm.com
链接:https://www.ibm.com/blogs/psirt/security-bulletin-vulnerability-in-bind-cve-2021-25215-2/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.1479
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.1754
来源:www.cybersecurity-help.cz
链接:https://www.cybersecurity-help.cz/vdb/SB2021073003
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/162721/Red-Hat-Security-Advisory-2021-2053-01.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.1713
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.1442
来源:www.cybersecurity-help.cz
链接:https://www.cybersecurity-help.cz/vdb/SB2021051902
来源:www.ibm.com
链接:https://www.ibm.com/blogs/psirt/security-bulletin-ibm-qradar-network-packet-capture-is-vulnerable-to-using-components-with-known-vulnerabilities-2/
来源:nvd.nist.gov
链接:https://nvd.nist.gov/vuln/detail/CVE-2021-25215
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/162388/Red-Hat-Security-Advisory-2021-1468-01.html
受影响实体
暂无
补丁
- ISC BIND 其他漏洞的修复措施<!--2021-4-29-->
还没有评论,来说两句吧...