Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2021-25216
Vulnerability from cvelistv5
Vendor | Product | Version | ||
---|---|---|---|---|
ISC | BIND9 |
Version: Open Source Branches 9.5 though 9.11 9.5.0 through versions before 9.11.31 Version: Open Source Branches 9.12 though 9.16 9.12.0 through versions before 9.16.14 Version: Supported Preview Branch 9.11-S 9.11.3-S1 through versions before 9.11.31-S1 Version: Supported Preview Branch 9.16-S 9.16.8-S1 through versions before 9.16.14-S1 Version: Development Branch 9.17 9.17.0 through versions before 9.17.2 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T19:56:11.090Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://kb.isc.org/v1/docs/cve-2021-25215", }, { name: "[oss-security] 20210428 ISC discloses three BIND vulnerabilities (CVE-2021-25214, CVE-2021-25215, and CVE-2021-25216)", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2021/04/29/1", }, { name: "[oss-security] 20210429 Re: ISC discloses three BIND vulnerabilities (CVE-2021-25214, CVE-2021-25215, and CVE-2021-25216)", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2021/04/29/2", }, { name: "[oss-security] 20210429 Re: ISC discloses three BIND vulnerabilities (CVE-2021-25214, CVE-2021-25215, and CVE-2021-25216)", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2021/04/29/3", }, { name: "[oss-security] 20210429 Re: ISC discloses three BIND vulnerabilities (CVE-2021-25214, CVE-2021-25215, and CVE-2021-25216)", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2021/04/29/4", }, { name: "DSA-4909", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "https://www.debian.org/security/2021/dsa-4909", }, { name: "[debian-lts-announce] 20210504 [SECURITY] [DLA 2647-1] bind9 security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2021/05/msg00001.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20210521-0006/", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.zerodayinitiative.com/advisories/ZDI-21-657/", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "BIND9", vendor: "ISC", versions: [ { status: "affected", version: "Open Source Branches 9.5 though 9.11 9.5.0 through versions before 9.11.31", }, { status: "affected", version: "Open Source Branches 9.12 though 9.16 9.12.0 through versions before 9.16.14", }, { status: "affected", version: "Supported Preview Branch 9.11-S 9.11.3-S1 through versions before 9.11.31-S1", }, { status: "affected", version: "Supported Preview Branch 9.16-S 9.16.8-S1 through versions before 9.16.14-S1", }, { status: "affected", version: "Development Branch 9.17 9.17.0 through versions before 9.17.2", }, ], }, ], credits: [ { lang: "en", value: "ISC would like to thank an anonymous party, working in conjunction with Trend Micro Zero Day Initiative, for reporting this issue to us.", }, ], datePublic: "2021-04-28T00:00:00", descriptions: [ { lang: "en", value: "In BIND 9.5.0 -> 9.11.29, 9.12.0 -> 9.16.13, and versions BIND 9.11.3-S1 -> 9.11.29-S1 and 9.16.8-S1 -> 9.16.13-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -> 9.17.1 of the BIND 9.17 development branch, BIND servers are vulnerable if they are running an affected version and are configured to use GSS-TSIG features. In a configuration which uses BIND's default settings the vulnerable code path is not exposed, but a server can be rendered vulnerable by explicitly setting values for the tkey-gssapi-keytab or tkey-gssapi-credential configuration options. Although the default configuration is not vulnerable, GSS-TSIG is frequently used in networks where BIND is integrated with Samba, as well as in mixed-server environments that combine BIND servers with Active Directory domain controllers. For servers that meet these conditions, the ISC SPNEGO implementation is vulnerable to various attacks, depending on the CPU architecture for which BIND was built: For named binaries compiled for 64-bit platforms, this flaw can be used to trigger a buffer over-read, leading to a server crash. For named binaries compiled for 32-bit platforms, this flaw can be used to trigger a server crash due to a buffer overflow and possibly also to achieve remote code execution. We have determined that standard SPNEGO implementations are available in the MIT and Heimdal Kerberos libraries, which support a broad range of operating systems, rendering the ISC implementation unnecessary and obsolete. Therefore, to reduce the attack surface for BIND users, we will be removing the ISC SPNEGO implementation in the April releases of BIND 9.11 and 9.16 (it had already been dropped from BIND 9.17). We would not normally remove something from a stable ESV (Extended Support Version) of BIND, but since system libraries can replace the ISC SPNEGO implementation, we have made an exception in this case for reasons of stability and security.", }, ], exploits: [ { lang: "en", value: "We are not aware of any active exploits.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, }, ], problemTypes: [ { descriptions: [ { description: "GSS-TSIG is an extension to the TSIG protocol which is intended to support the secure exchange of keys for use in verifying the authenticity of communications between parties on a network. SPNEGO is a negotiation mechanism used by GSSAPI, the application protocol interface for GSS-TSIG. The SPNEGO implementation used by BIND has been found to be vulnerable to a buffer overflow attack. Affects BIND 9.5.0 -> 9.11.29, 9.12.0 -> 9.16.13, and versions BIND 9.11.3-S1 -> 9.11.29-S1 and 9.16.8-S1 -> 9.16.13-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -> 9.17.1 of the BIND 9.17 development branch.", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2022-03-08T14:07:31", orgId: "404fd4d2-a609-4245-b543-2c944a302a22", shortName: "isc", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://kb.isc.org/v1/docs/cve-2021-25215", }, { name: "[oss-security] 20210428 ISC discloses three BIND vulnerabilities (CVE-2021-25214, CVE-2021-25215, and CVE-2021-25216)", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2021/04/29/1", }, { name: "[oss-security] 20210429 Re: ISC discloses three BIND vulnerabilities (CVE-2021-25214, CVE-2021-25215, and CVE-2021-25216)", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2021/04/29/2", }, { name: "[oss-security] 20210429 Re: ISC discloses three BIND vulnerabilities (CVE-2021-25214, CVE-2021-25215, and CVE-2021-25216)", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2021/04/29/3", }, { name: "[oss-security] 20210429 Re: ISC discloses three BIND vulnerabilities (CVE-2021-25214, CVE-2021-25215, and CVE-2021-25216)", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2021/04/29/4", }, { name: "DSA-4909", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "https://www.debian.org/security/2021/dsa-4909", }, { name: "[debian-lts-announce] 20210504 [SECURITY] [DLA 2647-1] bind9 security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2021/05/msg00001.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://security.netapp.com/advisory/ntap-20210521-0006/", }, { tags: [ "x_refsource_MISC", ], url: "https://www.zerodayinitiative.com/advisories/ZDI-21-657/", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf", }, ], solutions: [ { lang: "en", value: "Upgrade to the patched release most closely related to your current version of BIND:\n\n BIND 9.11.31\n BIND 9.16.15\n BIND 9.17.12\n\nBIND Supported Preview Edition is a special feature preview branch of BIND provided to eligible ISC support customers.\n\n BIND 9.11.31-S1\n BIND 9.16.15-S1", }, ], source: { discovery: "EXTERNAL", }, title: "A second vulnerability in BIND's GSSAPI security policy negotiation can be targeted by a buffer overflow attack", workarounds: [ { lang: "en", value: "This vulnerability only affects servers configured to use GSS-TSIG, most often to sign dynamic updates. If another mechanism can be used to authenticate updates, the vulnerability can be avoided by choosing not to enable the use of GSS-TSIG features.\n\nPrior to the April 2021 BIND releases, on some platforms it was possible to build a working BIND installation that was not vulnerable to CVE-2021-25216 by providing the --disable-isc-spnego command-line argument when running the ./configure script in the top level of the BIND source directory, before compiling and linking named.\n\nAfter the April 2021 BIND releases, all supported branches have removed isc-spnego support. This corrects CVE-2021-25216, but requires that the system have other libraries and header files to support GSS-TSIG functionality, unless such functionality is completely disabled at build time by providing the --without-gssapi argument to the ./configurescript when selecting build options.", }, ], x_generator: { engine: "Vulnogram 0.0.9", }, x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security-officer@isc.org", DATE_PUBLIC: "2021-04-28T20:20:10.000Z", ID: "CVE-2021-25216", STATE: "PUBLIC", TITLE: "A second vulnerability in BIND's GSSAPI security policy negotiation can be targeted by a buffer overflow attack", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "BIND9", version: { version_data: [ { version_name: "Open Source Branches 9.5 though 9.11", version_value: "9.5.0 through versions before 9.11.31", }, { version_name: "Open Source Branches 9.12 though 9.16", version_value: "9.12.0 through versions before 9.16.14", }, { version_name: "Supported Preview Branch 9.11-S", version_value: "9.11.3-S1 through versions before 9.11.31-S1", }, { version_name: "Supported Preview Branch 9.16-S", version_value: "9.16.8-S1 through versions before 9.16.14-S1", }, { version_name: "Development Branch 9.17", version_value: "9.17.0 through versions before 9.17.2", }, ], }, }, ], }, vendor_name: "ISC", }, ], }, }, credit: [ { lang: "eng", value: "ISC would like to thank an anonymous party, working in conjunction with Trend Micro Zero Day Initiative, for reporting this issue to us.", }, ], data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "In BIND 9.5.0 -> 9.11.29, 9.12.0 -> 9.16.13, and versions BIND 9.11.3-S1 -> 9.11.29-S1 and 9.16.8-S1 -> 9.16.13-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -> 9.17.1 of the BIND 9.17 development branch, BIND servers are vulnerable if they are running an affected version and are configured to use GSS-TSIG features. In a configuration which uses BIND's default settings the vulnerable code path is not exposed, but a server can be rendered vulnerable by explicitly setting values for the tkey-gssapi-keytab or tkey-gssapi-credential configuration options. Although the default configuration is not vulnerable, GSS-TSIG is frequently used in networks where BIND is integrated with Samba, as well as in mixed-server environments that combine BIND servers with Active Directory domain controllers. For servers that meet these conditions, the ISC SPNEGO implementation is vulnerable to various attacks, depending on the CPU architecture for which BIND was built: For named binaries compiled for 64-bit platforms, this flaw can be used to trigger a buffer over-read, leading to a server crash. For named binaries compiled for 32-bit platforms, this flaw can be used to trigger a server crash due to a buffer overflow and possibly also to achieve remote code execution. We have determined that standard SPNEGO implementations are available in the MIT and Heimdal Kerberos libraries, which support a broad range of operating systems, rendering the ISC implementation unnecessary and obsolete. Therefore, to reduce the attack surface for BIND users, we will be removing the ISC SPNEGO implementation in the April releases of BIND 9.11 and 9.16 (it had already been dropped from BIND 9.17). We would not normally remove something from a stable ESV (Extended Support Version) of BIND, but since system libraries can replace the ISC SPNEGO implementation, we have made an exception in this case for reasons of stability and security.", }, ], }, exploit: [ { lang: "en", value: "We are not aware of any active exploits.", }, ], generator: { engine: "Vulnogram 0.0.9", }, impact: { cvss: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "GSS-TSIG is an extension to the TSIG protocol which is intended to support the secure exchange of keys for use in verifying the authenticity of communications between parties on a network. SPNEGO is a negotiation mechanism used by GSSAPI, the application protocol interface for GSS-TSIG. The SPNEGO implementation used by BIND has been found to be vulnerable to a buffer overflow attack. Affects BIND 9.5.0 -> 9.11.29, 9.12.0 -> 9.16.13, and versions BIND 9.11.3-S1 -> 9.11.29-S1 and 9.16.8-S1 -> 9.16.13-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -> 9.17.1 of the BIND 9.17 development branch.", }, ], }, ], }, references: { reference_data: [ { name: "https://kb.isc.org/v1/docs/cve-2021-25215", refsource: "CONFIRM", url: "https://kb.isc.org/v1/docs/cve-2021-25215", }, { name: "[oss-security] 20210428 ISC discloses three BIND vulnerabilities (CVE-2021-25214, CVE-2021-25215, and CVE-2021-25216)", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2021/04/29/1", }, { name: "[oss-security] 20210429 Re: ISC discloses three BIND vulnerabilities (CVE-2021-25214, CVE-2021-25215, and CVE-2021-25216)", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2021/04/29/2", }, { name: "[oss-security] 20210429 Re: ISC discloses three BIND vulnerabilities (CVE-2021-25214, CVE-2021-25215, and CVE-2021-25216)", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2021/04/29/3", }, { name: "[oss-security] 20210429 Re: ISC discloses three BIND vulnerabilities (CVE-2021-25214, CVE-2021-25215, and CVE-2021-25216)", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2021/04/29/4", }, { name: "DSA-4909", refsource: "DEBIAN", url: "https://www.debian.org/security/2021/dsa-4909", }, { name: "[debian-lts-announce] 20210504 [SECURITY] [DLA 2647-1] bind9 security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2021/05/msg00001.html", }, { name: "https://security.netapp.com/advisory/ntap-20210521-0006/", refsource: "CONFIRM", url: "https://security.netapp.com/advisory/ntap-20210521-0006/", }, { name: "https://www.zerodayinitiative.com/advisories/ZDI-21-657/", refsource: "MISC", url: "https://www.zerodayinitiative.com/advisories/ZDI-21-657/", }, { name: "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf", refsource: "CONFIRM", url: "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf", }, ], }, solution: [ { lang: "en", value: "Upgrade to the patched release most closely related to your current version of BIND:\n\n BIND 9.11.31\n BIND 9.16.15\n BIND 9.17.12\n\nBIND Supported Preview Edition is a special feature preview branch of BIND provided to eligible ISC support customers.\n\n BIND 9.11.31-S1\n BIND 9.16.15-S1", }, ], source: { discovery: "EXTERNAL", }, work_around: [ { lang: "en", value: "This vulnerability only affects servers configured to use GSS-TSIG, most often to sign dynamic updates. If another mechanism can be used to authenticate updates, the vulnerability can be avoided by choosing not to enable the use of GSS-TSIG features.\n\nPrior to the April 2021 BIND releases, on some platforms it was possible to build a working BIND installation that was not vulnerable to CVE-2021-25216 by providing the --disable-isc-spnego command-line argument when running the ./configure script in the top level of the BIND source directory, before compiling and linking named.\n\nAfter the April 2021 BIND releases, all supported branches have removed isc-spnego support. This corrects CVE-2021-25216, but requires that the system have other libraries and header files to support GSS-TSIG functionality, unless such functionality is completely disabled at build time by providing the --without-gssapi argument to the ./configurescript when selecting build options.", }, ], }, }, }, cveMetadata: { assignerOrgId: "404fd4d2-a609-4245-b543-2c944a302a22", assignerShortName: "isc", cveId: "CVE-2021-25216", datePublished: "2021-04-29T00:55:17.362447Z", dateReserved: "2021-01-15T00:00:00", dateUpdated: "2024-09-16T22:25:23.581Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", "vulnerability-lookup:meta": { fkie_nvd: { configurations: "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DEECE5FC-CACF-4496-A3E7-164736409252\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"07B237A9-69A3-4A9C-9DA0-4E06BD37AE73\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:isc:bind:*:*:*:*:-:*:*:*\", \"versionStartIncluding\": \"9.0.0\", \"versionEndExcluding\": \"9.11.31\", \"matchCriteriaId\": \"18B8AA9D-C4D1-4F3B-9440-FC29D925961D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:isc:bind:*:*:*:*:-:*:*:*\", \"versionStartIncluding\": \"9.12.0\", \"versionEndExcluding\": \"9.16.15\", \"matchCriteriaId\": \"E38EFB1A-11B5-403F-815F-4899E7007D02\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:isc:bind:*:*:*:*:-:*:*:*\", \"versionStartIncluding\": \"9.17.0\", \"versionEndExcluding\": \"9.17.12\", \"matchCriteriaId\": \"00F9BCC7-51F7-47EE-AFCE-946F24CC3694\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:isc:bind:9.9.3:s1:*:*:supported_preview:*:*:*\", \"matchCriteriaId\": \"40EE014B-0CD8-45F3-BEDB-AE6368A78B04\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:isc:bind:9.9.12:s1:*:*:supported_preview:*:*:*\", \"matchCriteriaId\": \"DAF8FA8C-0526-4389-AEC6-92AD62AA3929\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:isc:bind:9.9.13:s1:*:*:supported_preview:*:*:*\", \"matchCriteriaId\": \"1A9BA952-A5DF-4CBA-8928-0B373C013C32\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:isc:bind:9.10.5:s1:*:*:supported_preview:*:*:*\", \"matchCriteriaId\": \"CAD41122-C5D8-4256-8CB7-FF88DCD96A13\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:isc:bind:9.10.7:s1:*:*:supported_preview:*:*:*\", \"matchCriteriaId\": \"6243685F-1E5B-4FF6-AE1B-44798032FBA6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:isc:bind:9.11.3:s1:*:*:supported_preview:*:*:*\", \"matchCriteriaId\": \"C2FE13E1-0646-46FC-875B-CB4C34E20101\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:isc:bind:9.11.5:s3:*:*:supported_preview:*:*:*\", \"matchCriteriaId\": \"1AA16E51-819C-4A1B-B66E-1C60C1782C0D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:isc:bind:9.11.5:s5:*:*:supported_preview:*:*:*\", \"matchCriteriaId\": \"91533F9F-C0E5-4E84-8A4C-F744F956BF97\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:isc:bind:9.11.5:s6:*:*:supported_preview:*:*:*\", \"matchCriteriaId\": \"46E6A4BD-D69B-4A70-821D-5612DD1315EF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:isc:bind:9.11.6:s1:*:*:supported_preview:*:*:*\", \"matchCriteriaId\": \"8AF9D390-0D5B-4963-A2D3-BF1E7CD95E9D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:isc:bind:9.11.7:s1:*:*:supported_preview:*:*:*\", \"matchCriteriaId\": \"AB2B92F1-6BA8-41CA-9000-E0633462CC28\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:isc:bind:9.11.8:s1:*:*:supported_preview:*:*:*\", \"matchCriteriaId\": \"02CA4635-7DFC-408E-A837-856E0F96CA1B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:isc:bind:9.11.12:s1:*:*:supported_preview:*:*:*\", \"matchCriteriaId\": \"3CABCB08-B838-45F7-AA87-77C6B8767DD0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:isc:bind:9.11.21:s1:*:*:supported_preview:*:*:*\", \"matchCriteriaId\": \"5CC1F26C-4757-4C87-BD8B-2FA456A88C6F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:isc:bind:9.11.27:s1:*:*:supported_preview:*:*:*\", \"matchCriteriaId\": \"582A4948-B64F-45D4-807A-846A85BB6B42\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:isc:bind:9.11.29:s1:*:*:supported_preview:*:*:*\", \"matchCriteriaId\": \"F22E7F6A-0714-480D-ACDF-5027FD6697B2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:isc:bind:9.16.8:s1:*:*:supported_preview:*:*:*\", \"matchCriteriaId\": \"288EAD80-574B-4839-9C2C-81D6D088A733\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:isc:bind:9.16.11:s1:*:*:supported_preview:*:*:*\", \"matchCriteriaId\": \"3595F024-F910-4356-8B5B-D478960FF574\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:isc:bind:9.16.13:s1:*:*:supported_preview:*:*:*\", \"matchCriteriaId\": \"94661BA2-27F8-4FFE-B844-9404F735579D\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:siemens:sinec_infrastructure_network_services:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.0.1.1\", \"matchCriteriaId\": \"B0F46497-4AB0-49A7-9453-CC26837BF253\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vsphere:*:*\", \"matchCriteriaId\": \"E8F29E19-3A64-4426-A2AA-F169440267CC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5C2089EE-5D7F-47EC-8EA5-0F69790564C4\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:netapp:aff_a250_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0D5DE972-F8B8-4964-943A-DA0BD18289D1\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:netapp:aff_a250:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D4B1F59C-6ADA-4930-834F-2A8A8444F6AE\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:netapp:aff_500f_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"578BB9A7-BF28-4068-A9A6-1DE19CEEC293\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:netapp:aff_500f:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2AB58180-E5E0-4056-ABF9-A99E9F6A9E86\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6770B6C3-732E-4E22-BF1C-2D2FD610061C\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9F9C8C20-42EB-4AB5-BD97-212DEB070C43\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7FFF7106-ED78-49BA-9EC5-B889E3685D53\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E63D8B0F-006E-4801-BF9D-1C001BBFB4F9\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"56409CEC-5A1E-4450-AA42-641E459CC2AF\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B06F4839-D16A-4A61-9BB5-55B13F41E47F\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:netapp:h300e_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"108A2215-50FB-4074-94CF-C130FA14566D\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:netapp:h300e:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7AFC73CE-ABB9-42D3-9A71-3F5BC5381E0E\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:netapp:h500e_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"32F0B6C0-F930-480D-962B-3F4EFDCC13C7\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:netapp:h500e:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"803BC414-B250-4E3A-A478-A3881340D6B8\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:netapp:h700e_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0FEB3337-BFDE-462A-908B-176F92053CEC\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:netapp:h700e:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"736AEAE9-782B-4F71-9893-DED53367E102\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D0B4AD8A-F172-4558-AEC6-FF424BA2D912\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8497A4C9-8474-4A62-8331-3FE862ED4098\"}]}]}]", descriptions: "[{\"lang\": \"en\", \"value\": \"In BIND 9.5.0 -> 9.11.29, 9.12.0 -> 9.16.13, and versions BIND 9.11.3-S1 -> 9.11.29-S1 and 9.16.8-S1 -> 9.16.13-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -> 9.17.1 of the BIND 9.17 development branch, BIND servers are vulnerable if they are running an affected version and are configured to use GSS-TSIG features. In a configuration which uses BIND's default settings the vulnerable code path is not exposed, but a server can be rendered vulnerable by explicitly setting values for the tkey-gssapi-keytab or tkey-gssapi-credential configuration options. Although the default configuration is not vulnerable, GSS-TSIG is frequently used in networks where BIND is integrated with Samba, as well as in mixed-server environments that combine BIND servers with Active Directory domain controllers. For servers that meet these conditions, the ISC SPNEGO implementation is vulnerable to various attacks, depending on the CPU architecture for which BIND was built: For named binaries compiled for 64-bit platforms, this flaw can be used to trigger a buffer over-read, leading to a server crash. For named binaries compiled for 32-bit platforms, this flaw can be used to trigger a server crash due to a buffer overflow and possibly also to achieve remote code execution. We have determined that standard SPNEGO implementations are available in the MIT and Heimdal Kerberos libraries, which support a broad range of operating systems, rendering the ISC implementation unnecessary and obsolete. Therefore, to reduce the attack surface for BIND users, we will be removing the ISC SPNEGO implementation in the April releases of BIND 9.11 and 9.16 (it had already been dropped from BIND 9.17). We would not normally remove something from a stable ESV (Extended Support Version) of BIND, but since system libraries can replace the ISC SPNEGO implementation, we have made an exception in this case for reasons of stability and security.\"}, {\"lang\": \"es\", \"value\": \"En BIND versiones 9.5.0 posteriores a 9.11.29, versiones 9.12.0 posteriores a 9.16.13, y BIND versiones 9.11.3-S1 posteriores a 9.11.29-S1 y versiones 9.16.8-S1 posteriores a 9.16.13-S1 de BIND Supported Preview Edition, as\\u00ed como las versiones 9.17.0 posteriores 9.17.1 de la rama de desarrollo BIND 9.17, los servidores BIND son vulnerables si ejecutan una versi\\u00f3n afectada y est\\u00e1n configurados para usar las funcionalidades GSS-TSIG. En una configuraci\\u00f3n que usa la configuraci\\u00f3n predeterminada de BIND, la ruta del c\\u00f3digo vulnerable no est\\u00e1 expuesta, pero un servidor puede volverse vulnerable al ajustar valores expl\\u00edcitamente para las opciones de configuraci\\u00f3n tkey-gssapi-keytab o tkey-gssapi-credential. Aunque la configuraci\\u00f3n predeterminada no es vulnerable, GSS-TSIG es usado con frecuencia en redes donde BIND est\\u00e1 integrado con Samba, as\\u00ed como en entornos de servidores mixtos que combinan servidores BIND con controladores de dominio de Active Directory. Para los servidores que cumplen con estas condiciones, la implementaci\\u00f3n de ISC SPNEGO es vulnerable a varios ataques, dependiendo de la arquitectura de la CPU para la que se construy\\u00f3 BIND: Para binarios con nombre compilados para plataformas de 64 bits, este fallo puede ser usado para desencadenar una sobrelectura del b\\u00fafer, conllevando a un bloqueo del servidor. Para binarios con nombre compilados para plataformas de 32 bits, este fallo puede ser usado para desencadenar un bloqueo del servidor debido a un desbordamiento del b\\u00fafer y posiblemente tambi\\u00e9n para lograr la Ejecuci\\u00f3n de C\\u00f3digo Remota. Hemos determinado que las implementaciones est\\u00e1ndar de SPNEGO est\\u00e1n disponibles en las bibliotecas MIT y Heimdal Kerberos, que admiten una amplia gama de sistemas operativos, lo que hace que la implementaci\\u00f3n de ISC sea innecesaria y obsoleta. Por lo tanto, para reducir la superficie de ataque para los usuarios de BIND, eliminaremos la implementaci\\u00f3n de ISC SPNEGO en las versiones de abril de BIND 9.11 y 9. 16 (ya se hab\\u00eda eliminado de BIND 9.17). Normalmente no eliminar\\u00edamos algo de una ESV (versi\\u00f3n de soporte extendido) estable de BIND, pero dado que las bibliotecas del sistema pueden reemplazar la implementaci\\u00f3n de ISC SPNEGO, hemos hecho una excepci\\u00f3n en este caso por razones de estabilidad y seguridad\"}]", id: "CVE-2021-25216", lastModified: "2024-11-21T05:54:33.850", metrics: "{\"cvssMetricV31\": [{\"source\": \"security-officer@isc.org\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 8.1, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.2, \"impactScore\": 5.9}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 9.8, \"baseSeverity\": \"CRITICAL\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 5.9}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:P/I:P/A:P\", \"baseScore\": 6.8, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.6, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}", published: "2021-04-29T01:15:08.047", references: "[{\"url\": \"http://www.openwall.com/lists/oss-security/2021/04/29/1\", \"source\": \"security-officer@isc.org\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2021/04/29/2\", \"source\": \"security-officer@isc.org\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2021/04/29/3\", \"source\": \"security-officer@isc.org\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2021/04/29/4\", \"source\": \"security-officer@isc.org\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf\", \"source\": \"security-officer@isc.org\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://kb.isc.org/v1/docs/cve-2021-25215\", \"source\": \"security-officer@isc.org\", \"tags\": [\"Not Applicable\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2021/05/msg00001.html\", \"source\": \"security-officer@isc.org\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20210521-0006/\", \"source\": \"security-officer@isc.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.debian.org/security/2021/dsa-4909\", \"source\": \"security-officer@isc.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.zerodayinitiative.com/advisories/ZDI-21-657/\", \"source\": \"security-officer@isc.org\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2021/04/29/1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2021/04/29/2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2021/04/29/3\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2021/04/29/4\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://kb.isc.org/v1/docs/cve-2021-25215\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Not Applicable\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2021/05/msg00001.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20210521-0006/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.debian.org/security/2021/dsa-4909\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.zerodayinitiative.com/advisories/ZDI-21-657/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}]", sourceIdentifier: "security-officer@isc.org", vulnStatus: "Modified", weaknesses: "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-125\"}]}]", }, nvd: "{\"cve\":{\"id\":\"CVE-2021-25216\",\"sourceIdentifier\":\"security-officer@isc.org\",\"published\":\"2021-04-29T01:15:08.047\",\"lastModified\":\"2024-11-21T05:54:33.850\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In BIND 9.5.0 -> 9.11.29, 9.12.0 -> 9.16.13, and versions BIND 9.11.3-S1 -> 9.11.29-S1 and 9.16.8-S1 -> 9.16.13-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -> 9.17.1 of the BIND 9.17 development branch, BIND servers are vulnerable if they are running an affected version and are configured to use GSS-TSIG features. In a configuration which uses BIND's default settings the vulnerable code path is not exposed, but a server can be rendered vulnerable by explicitly setting values for the tkey-gssapi-keytab or tkey-gssapi-credential configuration options. Although the default configuration is not vulnerable, GSS-TSIG is frequently used in networks where BIND is integrated with Samba, as well as in mixed-server environments that combine BIND servers with Active Directory domain controllers. For servers that meet these conditions, the ISC SPNEGO implementation is vulnerable to various attacks, depending on the CPU architecture for which BIND was built: For named binaries compiled for 64-bit platforms, this flaw can be used to trigger a buffer over-read, leading to a server crash. For named binaries compiled for 32-bit platforms, this flaw can be used to trigger a server crash due to a buffer overflow and possibly also to achieve remote code execution. We have determined that standard SPNEGO implementations are available in the MIT and Heimdal Kerberos libraries, which support a broad range of operating systems, rendering the ISC implementation unnecessary and obsolete. Therefore, to reduce the attack surface for BIND users, we will be removing the ISC SPNEGO implementation in the April releases of BIND 9.11 and 9.16 (it had already been dropped from BIND 9.17). We would not normally remove something from a stable ESV (Extended Support Version) of BIND, but since system libraries can replace the ISC SPNEGO implementation, we have made an exception in this case for reasons of stability and security.\"},{\"lang\":\"es\",\"value\":\"En BIND versiones 9.5.0 posteriores a 9.11.29, versiones 9.12.0 posteriores a 9.16.13, y BIND versiones 9.11.3-S1 posteriores a 9.11.29-S1 y versiones 9.16.8-S1 posteriores a 9.16.13-S1 de BIND Supported Preview Edition, así como las versiones 9.17.0 posteriores 9.17.1 de la rama de desarrollo BIND 9.17, los servidores BIND son vulnerables si ejecutan una versión afectada y están configurados para usar las funcionalidades GSS-TSIG. En una configuración que usa la configuración predeterminada de BIND, la ruta del código vulnerable no está expuesta, pero un servidor puede volverse vulnerable al ajustar valores explícitamente para las opciones de configuración tkey-gssapi-keytab o tkey-gssapi-credential. Aunque la configuración predeterminada no es vulnerable, GSS-TSIG es usado con frecuencia en redes donde BIND está integrado con Samba, así como en entornos de servidores mixtos que combinan servidores BIND con controladores de dominio de Active Directory. Para los servidores que cumplen con estas condiciones, la implementación de ISC SPNEGO es vulnerable a varios ataques, dependiendo de la arquitectura de la CPU para la que se construyó BIND: Para binarios con nombre compilados para plataformas de 64 bits, este fallo puede ser usado para desencadenar una sobrelectura del búfer, conllevando a un bloqueo del servidor. Para binarios con nombre compilados para plataformas de 32 bits, este fallo puede ser usado para desencadenar un bloqueo del servidor debido a un desbordamiento del búfer y posiblemente también para lograr la Ejecución de Código Remota. Hemos determinado que las implementaciones estándar de SPNEGO están disponibles en las bibliotecas MIT y Heimdal Kerberos, que admiten una amplia gama de sistemas operativos, lo que hace que la implementación de ISC sea innecesaria y obsoleta. Por lo tanto, para reducir la superficie de ataque para los usuarios de BIND, eliminaremos la implementación de ISC SPNEGO en las versiones de abril de BIND 9.11 y 9. 16 (ya se había eliminado de BIND 9.17). Normalmente no eliminaríamos algo de una ESV (versión de soporte extendido) estable de BIND, pero dado que las bibliotecas del sistema pueden reemplazar la implementación de ISC SPNEGO, hemos hecho una excepción en este caso por razones de estabilidad y seguridad\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-officer@isc.org\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":8.1,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.2,\"impactScore\":5.9},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:P\",\"baseScore\":6.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-125\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07B237A9-69A3-4A9C-9DA0-4E06BD37AE73\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:*:*:*:*:-:*:*:*\",\"versionStartIncluding\":\"9.0.0\",\"versionEndExcluding\":\"9.11.31\",\"matchCriteriaId\":\"18B8AA9D-C4D1-4F3B-9440-FC29D925961D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:*:*:*:*:-:*:*:*\",\"versionStartIncluding\":\"9.12.0\",\"versionEndExcluding\":\"9.16.15\",\"matchCriteriaId\":\"E38EFB1A-11B5-403F-815F-4899E7007D02\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:*:*:*:*:-:*:*:*\",\"versionStartIncluding\":\"9.17.0\",\"versionEndExcluding\":\"9.17.12\",\"matchCriteriaId\":\"00F9BCC7-51F7-47EE-AFCE-946F24CC3694\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.9.3:s1:*:*:supported_preview:*:*:*\",\"matchCriteriaId\":\"40EE014B-0CD8-45F3-BEDB-AE6368A78B04\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.9.12:s1:*:*:supported_preview:*:*:*\",\"matchCriteriaId\":\"DAF8FA8C-0526-4389-AEC6-92AD62AA3929\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.9.13:s1:*:*:supported_preview:*:*:*\",\"matchCriteriaId\":\"1A9BA952-A5DF-4CBA-8928-0B373C013C32\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.10.5:s1:*:*:supported_preview:*:*:*\",\"matchCriteriaId\":\"CAD41122-C5D8-4256-8CB7-FF88DCD96A13\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.10.7:s1:*:*:supported_preview:*:*:*\",\"matchCriteriaId\":\"6243685F-1E5B-4FF6-AE1B-44798032FBA6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.11.3:s1:*:*:supported_preview:*:*:*\",\"matchCriteriaId\":\"C2FE13E1-0646-46FC-875B-CB4C34E20101\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.11.5:s3:*:*:supported_preview:*:*:*\",\"matchCriteriaId\":\"1AA16E51-819C-4A1B-B66E-1C60C1782C0D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.11.5:s5:*:*:supported_preview:*:*:*\",\"matchCriteriaId\":\"91533F9F-C0E5-4E84-8A4C-F744F956BF97\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.11.5:s6:*:*:supported_preview:*:*:*\",\"matchCriteriaId\":\"46E6A4BD-D69B-4A70-821D-5612DD1315EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.11.6:s1:*:*:supported_preview:*:*:*\",\"matchCriteriaId\":\"8AF9D390-0D5B-4963-A2D3-BF1E7CD95E9D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.11.7:s1:*:*:supported_preview:*:*:*\",\"matchCriteriaId\":\"AB2B92F1-6BA8-41CA-9000-E0633462CC28\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.11.8:s1:*:*:supported_preview:*:*:*\",\"matchCriteriaId\":\"02CA4635-7DFC-408E-A837-856E0F96CA1B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.11.12:s1:*:*:supported_preview:*:*:*\",\"matchCriteriaId\":\"3CABCB08-B838-45F7-AA87-77C6B8767DD0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.11.21:s1:*:*:supported_preview:*:*:*\",\"matchCriteriaId\":\"5CC1F26C-4757-4C87-BD8B-2FA456A88C6F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.11.27:s1:*:*:supported_preview:*:*:*\",\"matchCriteriaId\":\"582A4948-B64F-45D4-807A-846A85BB6B42\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.11.29:s1:*:*:supported_preview:*:*:*\",\"matchCriteriaId\":\"F22E7F6A-0714-480D-ACDF-5027FD6697B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.16.8:s1:*:*:supported_preview:*:*:*\",\"matchCriteriaId\":\"288EAD80-574B-4839-9C2C-81D6D088A733\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.16.11:s1:*:*:supported_preview:*:*:*\",\"matchCriteriaId\":\"3595F024-F910-4356-8B5B-D478960FF574\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.16.13:s1:*:*:supported_preview:*:*:*\",\"matchCriteriaId\":\"94661BA2-27F8-4FFE-B844-9404F735579D\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:siemens:sinec_infrastructure_network_services:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.0.1.1\",\"matchCriteriaId\":\"B0F46497-4AB0-49A7-9453-CC26837BF253\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vsphere:*:*\",\"matchCriteriaId\":\"E8F29E19-3A64-4426-A2AA-F169440267CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C2089EE-5D7F-47EC-8EA5-0F69790564C4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:aff_a250_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D5DE972-F8B8-4964-943A-DA0BD18289D1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:aff_a250:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4B1F59C-6ADA-4930-834F-2A8A8444F6AE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:aff_500f_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"578BB9A7-BF28-4068-A9A6-1DE19CEEC293\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:aff_500f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2AB58180-E5E0-4056-ABF9-A99E9F6A9E86\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6770B6C3-732E-4E22-BF1C-2D2FD610061C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F9C8C20-42EB-4AB5-BD97-212DEB070C43\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7FFF7106-ED78-49BA-9EC5-B889E3685D53\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E63D8B0F-006E-4801-BF9D-1C001BBFB4F9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56409CEC-5A1E-4450-AA42-641E459CC2AF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B06F4839-D16A-4A61-9BB5-55B13F41E47F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h300e_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"108A2215-50FB-4074-94CF-C130FA14566D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h300e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7AFC73CE-ABB9-42D3-9A71-3F5BC5381E0E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h500e_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"32F0B6C0-F930-480D-962B-3F4EFDCC13C7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h500e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"803BC414-B250-4E3A-A478-A3881340D6B8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h700e_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0FEB3337-BFDE-462A-908B-176F92053CEC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h700e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"736AEAE9-782B-4F71-9893-DED53367E102\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0B4AD8A-F172-4558-AEC6-FF424BA2D912\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8497A4C9-8474-4A62-8331-3FE862ED4098\"}]}]}],\"references\":[{\"url\":\"http://www.openwall.com/lists/oss-security/2021/04/29/1\",\"source\":\"security-officer@isc.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2021/04/29/2\",\"source\":\"security-officer@isc.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2021/04/29/3\",\"source\":\"security-officer@isc.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2021/04/29/4\",\"source\":\"security-officer@isc.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf\",\"source\":\"security-officer@isc.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://kb.isc.org/v1/docs/cve-2021-25215\",\"source\":\"security-officer@isc.org\",\"tags\":[\"Not Applicable\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2021/05/msg00001.html\",\"source\":\"security-officer@isc.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20210521-0006/\",\"source\":\"security-officer@isc.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2021/dsa-4909\",\"source\":\"security-officer@isc.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.zerodayinitiative.com/advisories/ZDI-21-657/\",\"source\":\"security-officer@isc.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2021/04/29/1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2021/04/29/2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2021/04/29/3\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2021/04/29/4\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://kb.isc.org/v1/docs/cve-2021-25215\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Not Applicable\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2021/05/msg00001.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20210521-0006/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2021/dsa-4909\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.zerodayinitiative.com/advisories/ZDI-21-657/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]}]}}", }, }
icsa-22-069-09
Vulnerability from csaf_cisa
Notes
{ document: { acknowledgments: [ { organization: "Siemens ProductCERT", summary: "reporting these vulnerabilities to CISA.", }, ], category: "Siemens Security Advisory", csaf_version: "2.0", distribution: { text: "Disclosure is not limited", tlp: { label: "WHITE", url: "https://us-cert.cisa.gov/tlp/", }, }, notes: [ { category: "summary", text: "71 vulnerabilities in third-party components as Node.js, cURL, SQLite, CivetWeb and DNS(ISC BIND) could allow an attacker to interfere with the affected product in various ways.\n\nSiemens has released an update for SINEC INS and recommends to update to the latest versions.", title: "Summary", }, { category: "general", text: "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens' operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", title: "General Recommendations", }, { category: "general", text: "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories", title: "Additional Resources", }, { category: "legal_disclaimer", text: "Siemens Security Advisories are subject to the terms and conditions contained in Siemens' underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter \"License Terms\"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens' Global Website (https://www.siemens.com/terms_of_use, hereinafter \"Terms of Use\"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.", title: "Terms of Use", }, { category: "legal_disclaimer", text: "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", title: "Legal Notice", }, { category: "other", text: "This CISA CSAF advisory was converted from Siemens ProductCERT's CSAF advisory.", title: "Advisory Conversion Disclaimer", }, { category: "other", text: "Multiple", title: "Critical infrastructure sectors", }, { category: "other", text: "Worldwide", title: "Countries/areas deployed", }, { category: "other", text: "Germany", title: "Company headquarters location", }, { category: "general", text: "CISA recommends users take defensive measures to minimize the exploitation risk of this vulnerability.", title: "Recommended Practices", }, { category: "general", text: "Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the internet.", title: "Recommended Practices", }, { category: "general", text: "Locate control system networks and remote devices behind firewalls and isolate them from business networks.", title: "Recommended Practices", }, { category: "general", text: "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most recent version available. Also recognize VPN is only as secure as its connected devices.", title: "Recommended Practices", }, { category: "general", text: "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.", title: "Recommended Practices", }, { category: "general", text: "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", title: "Recommended Practices", }, { category: "general", text: "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.", title: "Recommended Practices", }, { category: "general", text: "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.", title: "Recommended Practices", }, ], publisher: { category: "other", contact_details: "central@cisa.dhs.gov", name: "CISA", namespace: "https://www.cisa.gov/", }, references: [ { category: "self", summary: "SSA-389290: Third-Party Component Vulnerabilities in SINEC INS - CSAF Version", url: "https://cert-portal.siemens.com/productcert/csaf/ssa-389290.json", }, { category: "self", summary: "SSA-389290: Third-Party Component Vulnerabilities in SINEC INS - TXT Version", url: "https://cert-portal.siemens.com/productcert/txt/ssa-389290.txt", }, { category: "self", summary: "SSA-389290: Third-Party Component Vulnerabilities in SINEC INS - PDF Version", url: "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf", }, { category: "self", summary: "ICS Advisory ICSA-22-069-09 JSON", url: "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2022/icsa-22-069-09.json", }, { category: "self", summary: "ICS Advisory ICSA-22-069-09 - Web Version", url: "https://www.cisa.gov/news-events/ics-advisories/icsa-22-069-09", }, { category: "external", summary: "Recommended Practices", url: "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01", }, { category: "external", summary: "Recommended Practices", url: "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices", }, { category: "external", summary: "Recommended Practices", url: "https://www.cisa.gov/topics/industrial-control-systems", }, { category: "external", summary: "Recommended Practices", url: "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf", }, { category: "external", summary: "Recommended Practices", url: "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf", }, { category: "external", summary: "Recommended Practices", url: "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B", }, ], title: "Siemens SINEC INS", tracking: { current_release_date: "2022-03-08T00:00:00.000000Z", generator: { engine: { name: "CISA CSAF Generator", version: "1.0.0", }, }, id: "ICSA-22-069-09", initial_release_date: "2022-03-08T00:00:00.000000Z", revision_history: [ { date: "2022-03-08T00:00:00.000000Z", legacy_version: "1.0", number: "1", summary: "Publication Date", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version_range", name: "<V1.0.1.1", product: { name: "SINEC INS", product_id: "CSAFPID-0001", }, }, ], category: "product_name", name: "SINEC INS", }, ], category: "vendor", name: "Siemens", }, ], }, vulnerabilities: [ { cve: "CVE-2019-19242", cwe: { id: "CWE-476", name: "NULL Pointer Dereference", }, notes: [ { category: "summary", text: "SQLite 3.30.1 mishandles pExpr->y.pTab, as demonstrated by the TK_COLUMN case in sqlite3ExprCodeTarget in expr.c.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2019-19242 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2019-19242 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-19242.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2019-19242", }, { cve: "CVE-2019-19244", cwe: { id: "CWE-20", name: "Improper Input Validation", }, notes: [ { category: "summary", text: "Select in select.c in SQLite 3.30.1 allows a crash if a sub-select uses both DISTINCT and window functions, and also has certain ORDER BY usage.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2019-19244 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2019-19244 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-19244.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2019-19244", }, { cve: "CVE-2019-19317", cwe: { id: "CWE-681", name: "Incorrect Conversion between Numeric Types", }, notes: [ { category: "summary", text: "lookupName in resolve.c in SQLite 3.30.1 omits bits from the colUsed bitmask in the case of a generated column, which allows attackers to cause a denial of service or possibly have unspecified other impact.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2019-19317 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2019-19317 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-19317.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2019-19317", }, { cve: "CVE-2019-19603", cwe: { id: "CWE-20", name: "Improper Input Validation", }, notes: [ { category: "summary", text: "SQLite 3.30.1 mishandles certain SELECT statements with a nonexistent VIEW, leading to an application crash.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2019-19603 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2019-19603 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-19603.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2019-19603", }, { cve: "CVE-2019-19645", cwe: { id: "CWE-674", name: "Uncontrolled Recursion", }, notes: [ { category: "summary", text: "alter.c in SQLite through 3.30.1 allows attackers to trigger infinite recursion via certain types of self-referential views in conjunction with ALTER TABLE statements.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2019-19645 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2019-19645 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-19645.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2019-19645", }, { cve: "CVE-2019-19646", cwe: { id: "CWE-754", name: "Improper Check for Unusual or Exceptional Conditions", }, notes: [ { category: "summary", text: "pragma.c in SQLite through 3.30.1 mishandles NOT NULL in an integrity_check PRAGMA command in certain cases of generated columns.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2019-19646 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2019-19646 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-19646.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2019-19646", }, { cve: "CVE-2019-19880", cwe: { id: "CWE-476", name: "NULL Pointer Dereference", }, notes: [ { category: "summary", text: "exprListAppendList in window.c in SQLite 3.30.1 allows attackers to trigger an invalid pointer dereference because constant integer values in ORDER BY clauses of window definitions are mishandled.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2019-19880 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2019-19880 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-19880.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2019-19880", }, { cve: "CVE-2019-19923", cwe: { id: "CWE-476", name: "NULL Pointer Dereference", }, notes: [ { category: "summary", text: "flattenSubquery in select.c in SQLite 3.30.1 mishandles certain uses of SELECT DISTINCT involving a LEFT JOIN in which the right-hand side is a view. This can cause a NULL pointer dereference (or incorrect results).", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2019-19923 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2019-19923 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-19923.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2019-19923", }, { cve: "CVE-2019-19924", cwe: { id: "CWE-755", name: "Improper Handling of Exceptional Conditions", }, notes: [ { category: "summary", text: "SQLite 3.30.1 mishandles certain parser-tree rewriting, related to expr.c, vdbeaux.c, and window.c. This is caused by incorrect sqlite3WindowRewrite() error handling.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2019-19924 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2019-19924 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-19924.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2019-19924", }, { cve: "CVE-2019-19925", cwe: { id: "CWE-434", name: "Unrestricted Upload of File with Dangerous Type", }, notes: [ { category: "summary", text: "zipfileUpdate in ext/misc/zipfile.c in SQLite 3.30.1 mishandles a NULL pathname during an update of a ZIP archive.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2019-19925 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2019-19925 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-19925.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2019-19925", }, { cve: "CVE-2019-19926", cwe: { id: "CWE-476", name: "NULL Pointer Dereference", }, notes: [ { category: "summary", text: "multiSelect in select.c in SQLite 3.30.1 mishandles certain errors during parsing, as demonstrated by errors from sqlite3WindowRewrite() calls. NOTE: this vulnerability exists because of an incomplete fix for CVE-2019-19880.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2019-19926 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2019-19926 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-19926.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2019-19926", }, { cve: "CVE-2020-1971", cwe: { id: "CWE-476", name: "NULL Pointer Dereference", }, notes: [ { category: "summary", text: "The X.509 GeneralName type is a generic type for representing different types of names. One of those name types is known as EDIPartyName. OpenSSL provides a function GENERAL_NAME_cmp which compares different instances of a GENERAL_NAME to see if they are equal or not. This function behaves incorrectly when both GENERAL_NAMEs contain an EDIPARTYNAME. A NULL pointer dereference and a crash may occur leading to a possible denial of service attack. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes: 1) Comparing CRL distribution point names between an available CRL and a CRL distribution point embedded in an X509 certificate 2) When verifying that a timestamp response token signer matches the timestamp authority name (exposed via the API functions TS_RESP_verify_response and TS_RESP_verify_token) If an attacker can control both items being compared then that attacker could trigger a crash. For example if the attacker can trick a client or server into checking a malicious certificate against a malicious CRL then this may occur. Note that some applications automatically download CRLs based on a URL embedded in a certificate. This checking happens prior to the signatures on the certificate and CRL being verified. OpenSSL's s_server, s_client and verify tools have support for the \"-crl_download\" option which implements automatic CRL downloading and this attack has been demonstrated to work against those tools. Note that an unrelated bug means that affected versions of OpenSSL cannot parse or construct correct encodings of EDIPARTYNAME. However it is possible to construct a malformed EDIPARTYNAME that OpenSSL's parser will accept and hence trigger this attack. All OpenSSL 1.1.1 and 1.0.2 versions are affected by this issue. Other OpenSSL releases are out of support and have not been checked. Fixed in OpenSSL 1.1.1i (Affected 1.1.1-1.1.1h). Fixed in OpenSSL 1.0.2x (Affected 1.0.2-1.0.2w).", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2020-1971 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2020-1971 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-1971.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2020-1971", }, { cve: "CVE-2020-7774", cwe: { id: "CWE-915", name: "Improperly Controlled Modification of Dynamically-Determined Object Attributes", }, notes: [ { category: "summary", text: "This affects the package y18n before 3.2.2, 4.0.1 and 5.0.5. PoC by po6ix: const y18n = require('y18n')(); y18n.setLocale('PROTO'); y18n.updateLocale({polluted: true}); console.log(polluted); // true", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2020-7774 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2020-7774 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-7774.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 7.3, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2020-7774", }, { cve: "CVE-2020-8169", cwe: { id: "CWE-200", name: "Exposure of Sensitive Information to an Unauthorized Actor", }, notes: [ { category: "summary", text: "The libcurl library versions 7.62.0 to and including 7.70.0 are vulnerable to an information disclosure vulnerability that can lead to a partial password being leaked over the network and to the DNS server(s).", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2020-8169 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2020-8169 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-8169.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2020-8169", }, { cve: "CVE-2020-8177", cwe: { id: "CWE-74", name: "Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')", }, notes: [ { category: "summary", text: "curl 7.20.0 through 7.70.0 is vulnerable to improper restriction of names for files and other resources that can lead too overwriting a local file when the -J flag is used.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2020-8177 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2020-8177 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-8177.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 7.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2020-8177", }, { cve: "CVE-2020-8231", cwe: { id: "CWE-416", name: "Use After Free", }, notes: [ { category: "summary", text: "Due to use of a dangling pointer, libcurl 7.29.0 through 7.71.1 can use the wrong connection when sending data.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2020-8231 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2020-8231 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-8231.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2020-8231", }, { cve: "CVE-2020-8265", cwe: { id: "CWE-416", name: "Use After Free", }, notes: [ { category: "summary", text: "Node.js versions before 10.23.1, 12.20.1, 14.15.4, 15.5.1 are vulnerable to a use-after-free bug in its TLS implementation. When writing to a TLS enabled socket, node::StreamBase::Write calls node::TLSWrap::DoWrite with a freshly allocated WriteWrap object as first argument. If the DoWrite method does not return an error, this object is passed back to the caller as part of a StreamWriteResult structure. This may be exploited to corrupt memory leading to a Denial of Service or potentially other exploits.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2020-8265 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2020-8265 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-8265.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2020-8265", }, { cve: "CVE-2020-8284", cwe: { id: "CWE-200", name: "Exposure of Sensitive Information to an Unauthorized Actor", }, notes: [ { category: "summary", text: "A malicious server can use the FTP PASV response to trick curl 7.73.0 and earlier into connecting back to a given IP address and port, and this way potentially make curl extract information about services that are otherwise private and not disclosed, for example doing port scanning and service banner extractions.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2020-8284 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2020-8284 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-8284.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2020-8284", }, { cve: "CVE-2020-8285", cwe: { id: "CWE-674", name: "Uncontrolled Recursion", }, notes: [ { category: "summary", text: "curl 7.21.0 to and including 7.73.0 is vulnerable to uncontrolled recursion due to a stack overflow issue in FTP wildcard match parsing.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2020-8285 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2020-8285 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-8285.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2020-8285", }, { cve: "CVE-2020-8286", cwe: { id: "CWE-295", name: "Improper Certificate Validation", }, notes: [ { category: "summary", text: "The libcurl library versions 7.41.0 to and including 7.73.0 are vulnerable to an improper check for certificate revocation due to insufficient verification of the OCSP response. This vulnerability could allow an attacker to pass a revoked certificate as valid.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2020-8286 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2020-8286 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-8286.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2020-8286", }, { cve: "CVE-2020-8287", cwe: { id: "CWE-444", name: "Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')", }, notes: [ { category: "summary", text: "Node.js versions before 10.23.1, 12.20.1, 14.15.4, 15.5.1 allow two copies of a header field in an HTTP request (for example, two Transfer-Encoding header fields). In this case, Node.js identifies the first header field and ignores the second. This can lead to HTTP Request Smuggling.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2020-8287 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2020-8287 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-8287.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2020-8287", }, { cve: "CVE-2020-8625", cwe: { id: "CWE-120", name: "Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')", }, notes: [ { category: "summary", text: "BIND servers are vulnerable if they are running an affected version and are configured to use GSS-TSIG features. In a configuration which uses BIND's default settings the vulnerable code path is not exposed, but a server can be rendered vulnerable by explicitly setting valid values for the tkey-gssapi-keytab or tkey-gssapi-credentialconfiguration options. Although the default configuration is not vulnerable, GSS-TSIG is frequently used in networks where BIND is integrated with Samba, as well as in mixed-server environments that combine BIND servers with Active Directory domain controllers. The most likely outcome of a successful exploitation of the vulnerability is a crash of the named process. However, remote code execution, while unproven, is theoretically possible. Affects: BIND 9.5.0 -> 9.11.27, 9.12.0 -> 9.16.11, and versions BIND 9.11.3-S1 -> 9.11.27-S1 and 9.16.8-S1 -> 9.16.11-S1 of BIND Supported Preview Edition. Also release versions 9.17.0 -> 9.17.1 of the BIND 9.17 development branch", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2020-8625 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2020-8625 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-8625.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2020-8625", }, { cve: "CVE-2020-9327", cwe: { id: "CWE-476", name: "NULL Pointer Dereference", }, notes: [ { category: "summary", text: "In SQLite 3.31.1, isAuxiliaryVtabOperator allows attackers to trigger a NULL pointer dereference and segmentation fault because of generated column optimizations.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2020-9327 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2020-9327 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-9327.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2020-9327", }, { cve: "CVE-2020-11655", cwe: { id: "CWE-665", name: "Improper Initialization", }, notes: [ { category: "summary", text: "SQLite through 3.31.1 allows attackers to cause a denial of service (segmentation fault) via a malformed window-function query because the AggInfo object's initialization is mishandled.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2020-11655 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2020-11655 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-11655.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2020-11655", }, { cve: "CVE-2020-11656", cwe: { id: "CWE-416", name: "Use After Free", }, notes: [ { category: "summary", text: "In SQLite through 3.31.1, the ALTER TABLE implementation has a use-after-free, as demonstrated by an ORDER BY clause that belongs to a compound SELECT statement.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2020-11656 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2020-11656 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-11656.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2020-11656", }, { cve: "CVE-2020-13630", cwe: { id: "CWE-416", name: "Use After Free", }, notes: [ { category: "summary", text: "ext/fts3/fts3.c in SQLite before 3.32.0 has a use-after-free in fts3EvalNextRow, related to the snippet feature.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2020-13630 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2020-13630 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-13630.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2020-13630", }, { cve: "CVE-2020-13631", cwe: { id: "CWE-20", name: "Improper Input Validation", }, notes: [ { category: "summary", text: "SQLite before 3.32.0 allows a virtual table to be renamed to the name of one of its shadow tables, related to alter.c and build.c.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2020-13631 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2020-13631 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-13631.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2020-13631", }, { cve: "CVE-2020-13632", cwe: { id: "CWE-476", name: "NULL Pointer Dereference", }, notes: [ { category: "summary", text: "ext/fts3/fts3_snippet.c in SQLite before 3.32.0 has a NULL pointer dereference via a crafted matchinfo() query.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2020-13632 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2020-13632 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-13632.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2020-13632", }, { cve: "CVE-2020-13871", cwe: { id: "CWE-416", name: "Use After Free", }, notes: [ { category: "summary", text: "SQLite 3.32.2 has a use-after-free in resetAccumulator in select.c because the parse tree rewrite for window functions is too late.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2020-13871 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2020-13871 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-13871.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2020-13871", }, { cve: "CVE-2020-15358", cwe: { id: "CWE-787", name: "Out-of-bounds Write", }, notes: [ { category: "summary", text: "In SQLite before 3.32.3, select.c mishandles query-flattener optimization, leading to a multiSelectOrderBy heap overflow because of misuse of transitive properties for constant propagation.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2020-15358 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2020-15358 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-15358.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2020-15358", }, { cve: "CVE-2020-27304", cwe: { id: "CWE-22", name: "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", }, notes: [ { category: "summary", text: "The CivetWeb web library does not validate uploaded filepaths when running on an OS other than Windows, when using the built-in HTTP form-based file upload mechanism, via the mg_handle_form_request API. Web applications that use the file upload form handler, and use parts of the user-controlled filename in the output path, are susceptible to directory traversal", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2020-27304 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2020-27304 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-27304.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2020-27304", }, { cve: "CVE-2021-3449", cwe: { id: "CWE-476", name: "NULL Pointer Dereference", }, notes: [ { category: "summary", text: "An OpenSSL TLS server may crash if sent a maliciously crafted renegotiation ClientHello message from a client. If a TLSv1.2 renegotiation ClientHello omits the signature_algorithms extension (where it was present in the initial ClientHello), but includes a signature_algorithms_cert extension then a NULL pointer dereference will result, leading to a crash and a denial of service attack. A server is only vulnerable if it has TLSv1.2 and renegotiation enabled (which is the default configuration). OpenSSL TLS clients are not impacted by this issue. All OpenSSL 1.1.1 versions are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1-1.1.1j).", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2021-3449 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2021-3449 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-3449.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2021-3449", }, { cve: "CVE-2021-3450", cwe: { id: "CWE-295", name: "Improper Certificate Validation", }, notes: [ { category: "summary", text: "The X509_V_FLAG_X509_STRICT flag enables additional security checks of the certificates present in a certificate chain. It is not set by default. Starting from OpenSSL version 1.1.1h a check to disallow certificates in the chain that have explicitly encoded elliptic curve parameters was added as an additional strict check. An error in the implementation of this check meant that the result of a previous check to confirm that certificates in the chain are valid CA certificates was overwritten. This effectively bypasses the check that non-CA certificates must not be able to issue other certificates. If a \"purpose\" has been configured then there is a subsequent opportunity for checks that the certificate is a valid CA. All of the named \"purpose\" values implemented in libcrypto perform this check. Therefore, where a purpose is set the certificate chain will still be rejected even when the strict flag has been used. A purpose is set by default in libssl client and server certificate verification routines, but it can be overridden or removed by an application. In order to be affected, an application must explicitly set the X509_V_FLAG_X509_STRICT verification flag and either not set a purpose for the certificate verification or, in the case of TLS client or server applications, override the default purpose. OpenSSL versions 1.1.1h and newer are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1h-1.1.1j).", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2021-3450 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2021-3450 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-3450.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2021-3450", }, { cve: "CVE-2021-3672", cwe: { id: "CWE-79", name: "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", }, notes: [ { category: "summary", text: "A flaw was found in c-ares library, where a missing input validation check of host names returned by DNS (Domain Name Servers) can lead to output of wrong hostnames which might potentially lead to Domain Hijacking. The highest threat from this vulnerability is to confidentiality and integrity as well as system availability.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2021-3672 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2021-3672 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-3672.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 5.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2021-3672", }, { cve: "CVE-2021-3711", cwe: { id: "CWE-120", name: "Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')", }, notes: [ { category: "summary", text: "In order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the \"out\" parameter can be NULL and, on exit, the \"outlen\" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the \"out\" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen data to overflow the buffer by up to a maximum of 62 bytes altering the contents of other data held after the buffer, possibly changing application behaviour or causing the application to crash. The location of the buffer is application dependent but is typically heap allocated. Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k).", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2021-3711 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2021-3711 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-3711.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2021-3711", }, { cve: "CVE-2021-3712", cwe: { id: "CWE-125", name: "Out-of-bounds Read", }, notes: [ { category: "summary", text: "ASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a strict requirement, ASN.1 strings that are parsed using OpenSSL's own \"d2i\" functions (and other similar parsing functions) as well as any string whose value has been set with the ASN1_STRING_set() function will additionally NUL terminate the byte array in the ASN1_STRING structure. However, it is possible for applications to directly construct valid ASN1_STRING structures which do not NUL terminate the byte array by directly setting the \"data\" and \"length\" fields in the ASN1_STRING array. This can also happen by using the ASN1_STRING_set0() function. Numerous OpenSSL functions that print ASN.1 data have been found to assume that the ASN1_STRING byte array will be NUL terminated, even though this is not guaranteed for strings that have been directly constructed. Where an application requests an ASN.1 structure to be printed, and where that ASN.1 structure contains ASN1_STRINGs that have been directly constructed by the application without NUL terminating the \"data\" field, then a read buffer overrun can occur. The same thing can also occur during name constraints processing of certificates (for example if a certificate has been directly constructed by the application instead of loading it via the OpenSSL parsing functions, and the certificate contains non NUL terminated ASN1_STRING structures). It can also occur in the X509_get1_email(), X509_REQ_get1_email() and X509_get1_ocsp() functions. If a malicious actor can cause an application to directly construct an ASN1_STRING and then process it through one of the affected OpenSSL functions then this issue could be hit. This might result in a crash (causing a Denial of Service attack). It could also result in the disclosure of private memory contents (such as private keys, or sensitive plaintext). Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k). Fixed in OpenSSL 1.0.2za (Affected 1.0.2-1.0.2y).", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2021-3712 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2021-3712 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-3712.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2021-3712", }, { cve: "CVE-2021-22876", cwe: { id: "CWE-200", name: "Exposure of Sensitive Information to an Unauthorized Actor", }, notes: [ { category: "summary", text: "curl 7.1.1 to and including 7.75.0 is vulnerable to an \"Exposure of Private Personal Information to an Unauthorized Actor\" by leaking credentials in the HTTP Referer: header. libcurl does not strip off user credentials from the URL when automatically populating the Referer: HTTP request header field in outgoing HTTP requests, and therefore risks leaking sensitive data to the server that is the target of the second HTTP request.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2021-22876 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2021-22876 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22876.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2021-22876", }, { cve: "CVE-2021-22883", cwe: { id: "CWE-400", name: "Uncontrolled Resource Consumption", }, notes: [ { category: "summary", text: "Node.js before 10.24.0, 12.21.0, 14.16.0, and 15.10.0 is vulnerable to a denial of service attack when too many connection attempts with an 'unknownProtocol' are established. This leads to a leak of file descriptors. If a file descriptor limit is configured on the system, then the server is unable to accept new connections and prevent the process also from opening, e.g. a file. If no file descriptor limit is configured, then this lead to an excessive memory usage and cause the system to run out of memory.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2021-22883 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2021-22883 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22883.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2021-22883", }, { cve: "CVE-2021-22884", cwe: { id: "CWE-20", name: "Improper Input Validation", }, notes: [ { category: "summary", text: "Node.js before 10.24.0, 12.21.0, 14.16.0, and 15.10.0 is vulnerable to DNS rebinding attacks as the whitelist includes “localhost6”. When “localhost6” is not present in /etc/hosts, it is just an ordinary domain that is resolved via DNS, i.e., over network. If the attacker controls the victim's DNS server or can spoof its responses, the DNS rebinding protection can be bypassed by using the “localhost6” domain. As long as the attacker uses the “localhost6” domain, they can still apply the attack described in CVE-2018-7160.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2021-22884 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2021-22884 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22884.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2021-22884", }, { cve: "CVE-2021-22890", cwe: { id: "CWE-290", name: "Authentication Bypass by Spoofing", }, notes: [ { category: "summary", text: "curl 7.63.0 to and including 7.75.0 includes vulnerability that allows a malicious HTTPS proxy to MITM a connection due to bad handling of TLS 1.3 session tickets. When using a HTTPS proxy and TLS 1.3, libcurl can confuse session tickets arriving from the HTTPS proxy but work as if they arrived from the remote server and then wrongly \"short-cut\" the host handshake. When confusing the tickets, a HTTPS proxy can trick libcurl to use the wrong session ticket resume for the host and thereby circumvent the server TLS certificate check and make a MITM attack to be possible to perform unnoticed. Note that such a malicious HTTPS proxy needs to provide a certificate that curl will accept for the MITMed server for an attack to work - unless curl has been told to ignore the server certificate check.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2021-22890 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2021-22890 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22890.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2021-22890", }, { cve: "CVE-2021-22897", cwe: { id: "CWE-668", name: "Exposure of Resource to Wrong Sphere", }, notes: [ { category: "summary", text: "curl 7.61.0 through 7.76.1 suffers from exposure of data element to wrong session due to a mistake in the code for CURLOPT_SSL_CIPHER_LIST when libcurl is built to use the Schannel TLS library. The selected cipher set was stored in a single \"static\" variable in the library, which has the surprising side-effect that if an application sets up multiple concurrent transfers, the last one that sets the ciphers will accidentally control the set used by all transfers. In a worst-case scenario, this weakens transport security significantly.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2021-22897 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2021-22897 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22897.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2021-22897", }, { cve: "CVE-2021-22898", cwe: { id: "CWE-909", name: "Missing Initialization of Resource", }, notes: [ { category: "summary", text: "curl 7.7 through 7.76.1 suffers from an information disclosure when the -t command line option, known as CURLOPT_TELNETOPTIONS in libcurl, is used to send variable=content pairs to TELNET servers. Due to a flaw in the option parser for sending NEW_ENV variables, libcurl could be made to pass on uninitialized data from a stack based buffer to the server, resulting in potentially revealing sensitive internal information to the server using a clear-text network protocol.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2021-22898 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2021-22898 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22898.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 3.1, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2021-22898", }, { cve: "CVE-2021-22901", cwe: { id: "CWE-416", name: "Use After Free", }, notes: [ { category: "summary", text: "curl 7.75.0 through 7.76.1 suffers from a use-after-free vulnerability resulting in already freed memory being used when a TLS 1.3 session ticket arrives over a connection. A malicious server can use this in rare unfortunate circumstances to potentially reach remote code execution in the client. When libcurl at run-time sets up support for TLS 1.3 session tickets on a connection using OpenSSL, it stores pointers to the transfer in-memory object for later retrieval when a session ticket arrives. If the connection is used by multiple transfers (like with a reused HTTP/1.1 connection or multiplexed HTTP/2 connection) that first transfer object might be freed before the new session is established on that connection and then the function will access a memory buffer that might be freed. When using that memory, libcurl might even call a function pointer in the object, making it possible for a remote code execution if the server could somehow manage to get crafted memory content into the correct place in memory.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2021-22901 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2021-22901 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22901.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2021-22901", }, { cve: "CVE-2021-22918", cwe: { id: "CWE-125", name: "Out-of-bounds Read", }, notes: [ { category: "summary", text: "Node.js before 16.4.1, 14.17.2, 12.22.2 is vulnerable to an out-of-bounds read when uv__idna_toascii() is used to convert strings to ASCII. The pointer p is read and increased without checking whether it is beyond pe, with the latter holding a pointer to the end of the buffer. This can lead to information disclosures or crashes. This function can be triggered via uv_getaddrinfo().", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2021-22918 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2021-22918 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22918.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2021-22918", }, { cve: "CVE-2021-22921", cwe: { id: "CWE-732", name: "Incorrect Permission Assignment for Critical Resource", }, notes: [ { category: "summary", text: "Node.js before 16.4.1, 14.17.2, and 12.22.2 is vulnerable to local privilege escalation attacks under certain conditions on Windows platforms. More specifically, improper configuration of permissions in the installation directory allows an attacker to perform two different escalation attacks: PATH and DLL hijacking.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2021-22921 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2021-22921 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22921.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2021-22921", }, { cve: "CVE-2021-22922", cwe: { id: "CWE-354", name: "Improper Validation of Integrity Check Value", }, notes: [ { category: "summary", text: "When curl is instructed to download content using the metalink feature, thecontents is verified against a hash provided in the metalink XML file.The metalink XML file points out to the client how to get the same contentfrom a set of different URLs, potentially hosted by different servers and theclient can then download the file from one or several of them. In a serial orparallel manner.If one of the servers hosting the contents has been breached and the contentsof the specific file on that server is replaced with a modified payload, curlshould detect this when the hash of the file mismatches after a completeddownload. It should remove the contents and instead try getting the contentsfrom another URL. This is not done, and instead such a hash mismatch is onlymentioned in text and the potentially malicious content is kept in the file ondisk.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2021-22922 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2021-22922 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22922.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2021-22922", }, { cve: "CVE-2021-22923", cwe: { id: "CWE-522", name: "Insufficiently Protected Credentials", }, notes: [ { category: "summary", text: "When curl is instructed to get content using the metalink feature, and a user name and password are used to download the metalink XML file, those same credentials are then subsequently passed on to each of the servers from which curl will download or try to download the contents from. Often contrary to the user's expectations and intentions and without telling the user it happened.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2021-22923 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2021-22923 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22923.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2021-22923", }, { cve: "CVE-2021-22924", cwe: { id: "CWE-706", name: "Use of Incorrectly-Resolved Name or Reference", }, notes: [ { category: "summary", text: "libcurl keeps previously used connections in a connection pool for subsequent transfers to reuse, if one of them matches the setup. Due to errors in the logic, the config matching function did not take 'issuercert' into account and it compared the involved paths _case insensitively_,which could lead to libcurl reusing wrong connections. File paths are, or can be, case sensitive on many systems but not all, and can even vary depending on used file systems. The comparison also didn't include the 'issuer cert' which a transfer can set to qualify how to verify the server certificate.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2021-22924 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2021-22924 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22924.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2021-22924", }, { cve: "CVE-2021-22925", cwe: { id: "CWE-908", name: "Use of Uninitialized Resource", }, notes: [ { category: "summary", text: "curl supports the -t command line option, known as CURLOPT_TELNETOPTIONSin libcurl. This rarely used option is used to send variable=content pairs toTELNET servers.Due to flaw in the option parser for sending NEW_ENV variables, libcurlcould be made to pass on uninitialized data from a stack based buffer to theserver. Therefore potentially revealing sensitive internal information to theserver using a clear-text network protocol.This could happen because curl did not call and use sscanf() correctly whenparsing the string provided by the application.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2021-22925 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2021-22925 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22925.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2021-22925", }, { cve: "CVE-2021-22926", cwe: { id: "CWE-295", name: "Improper Certificate Validation", }, notes: [ { category: "summary", text: "libcurl-using applications can ask for a specific client certificate to be used in a transfer. This is done with the CURLOPT_SSLCERT option (--cert with the command line tool).When libcurl is built to use the macOS native TLS library Secure Transport, an application can ask for the client certificate by name or with a file name - using the same option. If the name exists as a file, it will be used instead of by name.If the appliction runs with a current working directory that is writable by other users (like /tmp), a malicious user can create a file name with the same name as the app wants to use by name, and thereby trick the application to use the file based cert instead of the one referred to by name making libcurl send the wrong client certificate in the TLS connection handshake.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2021-22926 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2021-22926 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22926.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2021-22926", }, { cve: "CVE-2021-22930", cwe: { id: "CWE-416", name: "Use After Free", }, notes: [ { category: "summary", text: "Node.js before 16.6.0, 14.17.4, and 12.22.4 is vulnerable to a use after free attack where an attacker might be able to exploit the memory corruption, to change process behavior.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2021-22930 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2021-22930 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22930.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2021-22930", }, { cve: "CVE-2021-22931", cwe: { id: "CWE-20", name: "Improper Input Validation", }, notes: [ { category: "summary", text: "Node.js before 16.6.0, 14.17.4, and 12.22.4 is vulnerable to Remote Code Execution, XSS, Application crashes due to missing input validation of host names returned by Domain Name Servers in Node.js dns library which can lead to output of wrong hostnames (leading to Domain Hijacking) and injection vulnerabilities in applications using the library.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2021-22931 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2021-22931 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22931.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2021-22931", }, { cve: "CVE-2021-22939", cwe: { id: "CWE-295", name: "Improper Certificate Validation", }, notes: [ { category: "summary", text: "If the Node.js https API was used incorrectly and \"undefined\" was in passed for the \"rejectUnauthorized\" parameter, no error was returned and connections to servers with an expired certificate would have been accepted.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2021-22939 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2021-22939 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22939.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2021-22939", }, { cve: "CVE-2021-22940", cwe: { id: "CWE-416", name: "Use After Free", }, notes: [ { category: "summary", text: "Node.js before 16.6.1, 14.17.5, and 12.22.5 is vulnerable to a use after free attack where an attacker might be able to exploit the memory corruption, to change process behavior.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2021-22940 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2021-22940 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22940.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2021-22940", }, { cve: "CVE-2021-22945", cwe: { id: "CWE-415", name: "Double Free", }, notes: [ { category: "summary", text: "When sending data to an MQTT server, libcurl <= 7.73.0 and 7.78.0 could in some circumstances erroneously keep a pointer to an already freed memory area and both use that again in a subsequent call to send data and also free it _again_.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2021-22945 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2021-22945 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22945.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 9.1, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2021-22945", }, { cve: "CVE-2021-22946", cwe: { id: "CWE-319", name: "Cleartext Transmission of Sensitive Information", }, notes: [ { category: "summary", text: "A user can tell curl >= 7.20.0 and <= 7.78.0 to require a successful upgrade to TLS when speaking to an IMAP, POP3 or FTP server (--ssl-reqd on the command line orCURLOPT_USE_SSL set to CURLUSESSL_CONTROL or CURLUSESSL_ALL withlibcurl). This requirement could be bypassed if the server would return a properly crafted but perfectly legitimate response.This flaw would then make curl silently continue its operations WITHOUTTLS contrary to the instructions and expectations, exposing possibly sensitive data in clear text over the network.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2021-22946 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2021-22946 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22946.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2021-22946", }, { cve: "CVE-2021-22947", cwe: { id: "CWE-345", name: "Insufficient Verification of Data Authenticity", }, notes: [ { category: "summary", text: "When curl >= 7.20.0 and <= 7.78.0 connects to an IMAP or POP3 server to retrieve data using STARTTLS to upgrade to TLS security, the server can respond and send back multiple responses at once that curl caches. curl would then upgrade to TLS but not flush the in-queue of cached responses but instead continue using and trustingthe responses it got _before_ the TLS handshake as if they were authenticated.Using this flaw, it allows a Man-In-The-Middle attacker to first inject the fake responses, then pass-through the TLS traffic from the legitimate server and trick curl into sending data back to the user thinking the attacker's injected data comes from the TLS-protected server.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2021-22947 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2021-22947 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22947.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2021-22947", }, { cve: "CVE-2021-23362", cwe: { id: "CWE-20", name: "Improper Input Validation", }, notes: [ { category: "summary", text: "The package hosted-git-info before 3.0.8 are vulnerable to Regular Expression Denial of Service (ReDoS) via regular expression shortcutMatch in the fromUrl function in index.js. The affected regular expression exhibits polynomial worst-case time complexity.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2021-23362 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2021-23362 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-23362.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2021-23362", }, { cve: "CVE-2021-23840", cwe: { id: "CWE-190", name: "Integer Overflow or Wraparound", }, notes: [ { category: "summary", text: "Calls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissable length for an integer on the platform. In such cases the return value from the function call will be 1 (indicating success), but the output length value will be negative. This could cause applications to behave incorrectly or crash. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2021-23840 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2021-23840 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-23840.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2021-23840", }, { cve: "CVE-2021-25214", cwe: { id: "CWE-617", name: "Reachable Assertion", }, notes: [ { category: "summary", text: "In BIND 9.8.5 -> 9.8.8, 9.9.3 -> 9.11.29, 9.12.0 -> 9.16.13, and versions BIND 9.9.3-S1 -> 9.11.29-S1 and 9.16.8-S1 -> 9.16.13-S1 of BIND 9 Supported Preview Edition, as well as release versions 9.17.0 -> 9.17.11 of the BIND 9.17 development branch, when a vulnerable version of named receives a malformed IXFR triggering the flaw described above, the named process will terminate due to a failed assertion the next time the transferred secondary zone is refreshed.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2021-25214 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2021-25214 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-25214.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2021-25214", }, { cve: "CVE-2021-25215", cwe: { id: "CWE-617", name: "Reachable Assertion", }, notes: [ { category: "summary", text: "In BIND 9.0.0 -> 9.11.29, 9.12.0 -> 9.16.13, and versions BIND 9.9.3-S1 -> 9.11.29-S1 and 9.16.8-S1 -> 9.16.13-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -> 9.17.11 of the BIND 9.17 development branch, when a vulnerable version of named receives a query for a record triggering the flaw described above, the named process will terminate due to a failed assertion check. The vulnerability affects all currently maintained BIND 9 branches (9.11, 9.11-S, 9.16, 9.16-S, 9.17) as well as all other versions of BIND 9.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2021-25215 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2021-25215 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-25215.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2021-25215", }, { cve: "CVE-2021-25216", cwe: { id: "CWE-617", name: "Reachable Assertion", }, notes: [ { category: "summary", text: "In BIND 9.5.0 -> 9.11.29, 9.12.0 -> 9.16.13, and versions BIND 9.11.3-S1 -> 9.11.29-S1 and 9.16.8-S1 -> 9.16.13-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -> 9.17.1 of the BIND 9.17 development branch, BIND servers are vulnerable if they are running an affected version and are configured to use GSS-TSIG features. In a configuration which uses BIND's default settings the vulnerable code path is not exposed, but a server can be rendered vulnerable by explicitly setting values for the tkey-gssapi-keytab or tkey-gssapi-credential configuration options. Although the default configuration is not vulnerable, GSS-TSIG is frequently used in networks where BIND is integrated with Samba, as well as in mixed-server environments that combine BIND servers with Active Directory domain controllers. For servers that meet these conditions, the ISC SPNEGO implementation is vulnerable to various attacks, depending on the CPU architecture for which BIND was built: For named binaries compiled for 64-bit platforms, this flaw can be used to trigger a buffer over-read, leading to a server crash. For named binaries compiled for 32-bit platforms, this flaw can be used to trigger a server crash due to a buffer overflow and possibly also to achieve remote code execution. We have determined that standard SPNEGO implementations are available in the MIT and Heimdal Kerberos libraries, which support a broad range of operating systems, rendering the ISC implementation unnecessary and obsolete. Therefore, to reduce the attack surface for BIND users, we will be removing the ISC SPNEGO implementation in the April releases of BIND 9.11 and 9.16 (it had already been dropped from BIND 9.17). We would not normally remove something from a stable ESV (Extended Support Version) of BIND, but since system libraries can replace the ISC SPNEGO implementation, we have made an exception in this case for reasons of stability and security.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2021-25216 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2021-25216 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-25216.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2021-25216", }, { cve: "CVE-2021-25219", cwe: { id: "CWE-20", name: "Improper Input Validation", }, notes: [ { category: "summary", text: "In BIND 9.3.0 -> 9.11.35, 9.12.0 -> 9.16.21, and versions 9.9.3-S1 -> 9.11.35-S1 and 9.16.8-S1 -> 9.16.21-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -> 9.17.18 of the BIND 9.17 development branch, exploitation of broken authoritative servers using a flaw in response processing can cause degradation in BIND resolver performance. The way the lame cache is currently designed makes it possible for its internal data structures to grow almost infinitely, which may cause significant delays in client query processing.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2021-25219 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2021-25219 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-25219.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2021-25219", }, { cve: "CVE-2021-27290", cwe: { id: "CWE-20", name: "Improper Input Validation", }, notes: [ { category: "summary", text: "ssri 5.2.2-8.0.0, fixed in 8.0.1, processes SRIs using a regular expression which is vulnerable to a denial of service. Malicious SRIs could take an extremely long time to process, leading to denial of service. This issue only affects consumers using the strict option.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2021-27290 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2021-27290 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-27290.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2021-27290", }, { cve: "CVE-2021-32803", cwe: { id: "CWE-22", name: "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", }, notes: [ { category: "summary", text: "The npm package \"tar\" (aka node-tar) before versions 6.1.2, 5.0.7, 4.4.15, and 3.2.3 has an arbitrary File Creation/Overwrite vulnerability via insufficient symlink protection. node-tar aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary stat calls to determine whether a given path is a directory, paths are cached when directories are created. This logic was insufficient when extracting tar files that contained both a directory and a symlink with the same name as the directory. This order of operations resulted in the directory being created and added to the node-tar directory cache. When a directory is present in the directory cache, subsequent calls to mkdir for that directory are skipped. However, this is also where node-tar checks for symlinks occur. By first creating a directory, and then replacing that directory with a symlink, it was thus possible to bypass node-tar symlink checks on directories, essentially allowing an untrusted tar file to symlink into an arbitrary location and subsequently extracting arbitrary files into that location, thus allowing arbitrary file creation and overwrite. This issue was addressed in releases 3.2.3, 4.4.15, 5.0.7 and 6.1.2.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2021-32803 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2021-32803 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-32803.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2021-32803", }, { cve: "CVE-2021-32804", cwe: { id: "CWE-22", name: "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", }, notes: [ { category: "summary", text: "The npm package \"tar\" (aka node-tar) before versions 6.1.1, 5.0.6, 4.4.14, and 3.3.2 has a arbitrary File Creation/Overwrite vulnerability due to insufficient absolute path sanitization. node-tar aims to prevent extraction of absolute file paths by turning absolute paths into relative paths when the preservePaths flag is not set to true. This is achieved by stripping the absolute path root from any absolute file paths contained in a tar file. For example /home/user/.bashrc would turn into home/user/.bashrc. This logic was insufficient when file paths contained repeated path roots such as ////home/user/.bashrc. node-tar would only strip a single path root from such paths. When given an absolute file path with repeating path roots, the resulting path (e.g. ///home/user/.bashrc) would still resolve to an absolute path, thus allowing arbitrary file creation and overwrite. This issue was addressed in releases 3.2.2, 4.4.14, 5.0.6 and 6.1.1. Users may work around this vulnerability without upgrading by creating a custom onentry method which sanitizes the entry.path or a filter method which removes entries with absolute paths. See referenced GitHub Advisory for details. Be aware of CVE-2021-32803 which fixes a similar bug in later versions of tar.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2021-32804 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2021-32804 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-32804.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2021-32804", }, { cve: "CVE-2021-37701", cwe: { id: "CWE-59", name: "Improper Link Resolution Before File Access ('Link Following')", }, notes: [ { category: "summary", text: "The npm package \"tar\" (aka node-tar) before versions 4.4.16, 5.0.8, and 6.1.7 has an arbitrary file creation/overwrite and arbitrary code execution vulnerability. node-tar aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary stat calls to determine whether a given path is a directory, paths are cached when directories are created. This logic was insufficient when extracting tar files that contained both a directory and a symlink with the same name as the directory, where the symlink and directory names in the archive entry used backslashes as a path separator on posix systems. The cache checking logic used both \\ and / characters as path separators, however \\ is a valid filename character on posix systems. By first creating a directory, and then replacing that directory with a symlink, it was thus possible to bypass node-tar symlink checks on directories, essentially allowing an untrusted tar file to symlink into an arbitrary location and subsequently extracting arbitrary files into that location, thus allowing arbitrary file creation and overwrite. Additionally, a similar confusion could arise on case-insensitive filesystems. If a tar archive contained a directory at FOO, followed by a symbolic link named foo, then on case-insensitive file systems, the creation of the symbolic link would remove the directory from the filesystem, but _not_ from the internal directory cache, as it would not be treated as a cache hit. A subsequent file entry within the FOO directory would then be placed in the target of the symbolic link, thinking that the directory had already been created. These issues were addressed in releases 4.4.16, 5.0.8 and 6.1.7. The v3 branch of node-tar has been deprecated and did not receive patches for these issues. If you are still using a v3 release we recommend you update to a more recent version of node-tar. If this is not possible, a workaround is available in the referenced GHSA-9r2w-394v-53qc.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2021-37701 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2021-37701 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-37701.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 8.6, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2021-37701", }, { cve: "CVE-2021-37712", cwe: { id: "CWE-59", name: "Improper Link Resolution Before File Access ('Link Following')", }, notes: [ { category: "summary", text: "The npm package \"tar\" (aka node-tar) before versions 4.4.18, 5.0.10, and 6.1.9 has an arbitrary file creation/overwrite and arbitrary code execution vulnerability. node-tar aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary stat calls to determine whether a given path is a directory, paths are cached when directories are created. This logic was insufficient when extracting tar files that contained both a directory and a symlink with names containing unicode values that normalized to the same value. Additionally, on Windows systems, long path portions would resolve to the same file system entities as their 8.3 \"short path\" counterparts. A specially crafted tar archive could thus include a directory with one form of the path, followed by a symbolic link with a different string that resolves to the same file system entity, followed by a file using the first form. By first creating a directory, and then replacing that directory with a symlink that had a different apparent name that resolved to the same entry in the filesystem, it was thus possible to bypass node-tar symlink checks on directories, essentially allowing an untrusted tar file to symlink into an arbitrary location and subsequently extracting arbitrary files into that location, thus allowing arbitrary file creation and overwrite. These issues were addressed in releases 4.4.18, 5.0.10 and 6.1.9. The v3 branch of node-tar has been deprecated and did not receive patches for these issues. If you are still using a v3 release we recommend you update to a more recent version of node-tar. If this is not possible, a workaround is available in the referenced GHSA-qq89-hq3f-393p.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2021-37712 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2021-37712 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-37712.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 8.6, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2021-37712", }, { cve: "CVE-2021-37713", cwe: { id: "CWE-22", name: "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", }, notes: [ { category: "summary", text: "The npm package \"tar\" (aka node-tar) before versions 4.4.18, 5.0.10, and 6.1.9 has an arbitrary file creation/overwrite and arbitrary code execution vulnerability. node-tar aims to guarantee that any file whose location would be outside of the extraction target directory is not extracted. This is, in part, accomplished by sanitizing absolute paths of entries within the archive, skipping archive entries that contain .. path portions, and resolving the sanitized paths against the extraction target directory. This logic was insufficient on Windows systems when extracting tar files that contained a path that was not an absolute path, but specified a drive letter different from the extraction target, such as C:some\\path. If the drive letter does not match the extraction target, for example D:\\extraction\\dir, then the result of path.resolve(extractionDirectory, entryPath) would resolve against the current working directory on the C: drive, rather than the extraction target directory. Additionally, a .. portion of the path could occur immediately after the drive letter, such as C:../foo, and was not properly sanitized by the logic that checked for .. within the normalized and split portions of the path. This only affects users of node-tar on Windows systems. These issues were addressed in releases 4.4.18, 5.0.10 and 6.1.9. The v3 branch of node-tar has been deprecated and did not receive patches for these issues. If you are still using a v3 release we recommend you update to a more recent version of node-tar. There is no reasonable way to work around this issue without performing the same path normalization procedures that node-tar now does. Users are encouraged to upgrade to the latest patched versions of node-tar, rather than attempt to sanitize paths themselves.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2021-37713 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2021-37713 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-37713.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 8.6, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2021-37713", }, { cve: "CVE-2021-39134", cwe: { id: "CWE-61", name: "UNIX Symbolic Link (Symlink) Following", }, notes: [ { category: "summary", text: "@npmcli/arborist, the library that calculates dependency trees and manages the node_modules folder hierarchy for the npm command line interface, aims to guarantee that package dependency contracts will be met, and the extraction of package contents will always be performed into the expected folder. This is, in part, accomplished by resolving dependency specifiers defined in package.json manifests for dependencies with a specific name, and nesting folders to resolve conflicting dependencies. When multiple dependencies differ only in the case of their name, Arborist's internal data structure saw them as separate items that could coexist within the same level in the node_modules hierarchy. However, on case-insensitive file systems (such as macOS and Windows), this is not the case. Combined with a symlink dependency such as file:/some/path, this allowed an attacker to create a situation in which arbitrary contents could be written to any location on the filesystem. For example, a package pwn-a could define a dependency in their package.json file such as \"foo\": \"file:/some/path\". Another package, pwn-b could define a dependency such as FOO: \"file:foo.tgz\". On case-insensitive file systems, if pwn-a was installed, and then pwn-b was installed afterwards, the contents of foo.tgz would be written to /some/path, and any existing contents of /some/path would be removed. Anyone using npm v7.20.6 or earlier on a case-insensitive filesystem is potentially affected. This is patched in @npmcli/arborist 2.8.2 which is included in npm v7.20.7 and above.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2021-39134 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2021-39134 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-39134.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2021-39134", }, { cve: "CVE-2021-39135", cwe: { id: "CWE-61", name: "UNIX Symbolic Link (Symlink) Following", }, notes: [ { category: "summary", text: "@npmcli/arborist, the library that calculates dependency trees and manages the node_modules folder hierarchy for the npm command line interface, aims to guarantee that package dependency contracts will be met, and the extraction of package contents will always be performed into the expected folder. This is accomplished by extracting package contents into a project's node_modules folder. If the node_modules folder of the root project or any of its dependencies is somehow replaced with a symbolic link, it could allow Arborist to write package dependencies to any arbitrary location on the file system. Note that symbolic links contained within package artifact contents are filtered out, so another means of creating a node_modules symbolic link would have to be employed. 1. A preinstall script could replace node_modules with a symlink. (This is prevented by using --ignore-scripts.) 2. An attacker could supply the target with a git repository, instructing them to run npm install --ignore-scripts in the root. This may be successful, because npm install --ignore-scripts is typically not capable of making changes outside of the project directory, so it may be deemed safe. This is patched in @npmcli/arborist 2.8.2 which is included in npm v7.20.7 and above. For more information including workarounds please see the referenced GHSA-gmw6-94gg-2rc2.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2021-39135 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2021-39135 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-39135.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2021-39135", }, ], }
ICSA-22-069-09
Vulnerability from csaf_cisa
Notes
{ document: { acknowledgments: [ { organization: "Siemens ProductCERT", summary: "reporting these vulnerabilities to CISA.", }, ], category: "Siemens Security Advisory", csaf_version: "2.0", distribution: { text: "Disclosure is not limited", tlp: { label: "WHITE", url: "https://us-cert.cisa.gov/tlp/", }, }, notes: [ { category: "summary", text: "71 vulnerabilities in third-party components as Node.js, cURL, SQLite, CivetWeb and DNS(ISC BIND) could allow an attacker to interfere with the affected product in various ways.\n\nSiemens has released an update for SINEC INS and recommends to update to the latest versions.", title: "Summary", }, { category: "general", text: "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens' operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", title: "General Recommendations", }, { category: "general", text: "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories", title: "Additional Resources", }, { category: "legal_disclaimer", text: "Siemens Security Advisories are subject to the terms and conditions contained in Siemens' underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter \"License Terms\"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens' Global Website (https://www.siemens.com/terms_of_use, hereinafter \"Terms of Use\"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.", title: "Terms of Use", }, { category: "legal_disclaimer", text: "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", title: "Legal Notice", }, { category: "other", text: "This CISA CSAF advisory was converted from Siemens ProductCERT's CSAF advisory.", title: "Advisory Conversion Disclaimer", }, { category: "other", text: "Multiple", title: "Critical infrastructure sectors", }, { category: "other", text: "Worldwide", title: "Countries/areas deployed", }, { category: "other", text: "Germany", title: "Company headquarters location", }, { category: "general", text: "CISA recommends users take defensive measures to minimize the exploitation risk of this vulnerability.", title: "Recommended Practices", }, { category: "general", text: "Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the internet.", title: "Recommended Practices", }, { category: "general", text: "Locate control system networks and remote devices behind firewalls and isolate them from business networks.", title: "Recommended Practices", }, { category: "general", text: "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most recent version available. Also recognize VPN is only as secure as its connected devices.", title: "Recommended Practices", }, { category: "general", text: "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.", title: "Recommended Practices", }, { category: "general", text: "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", title: "Recommended Practices", }, { category: "general", text: "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.", title: "Recommended Practices", }, { category: "general", text: "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.", title: "Recommended Practices", }, ], publisher: { category: "other", contact_details: "central@cisa.dhs.gov", name: "CISA", namespace: "https://www.cisa.gov/", }, references: [ { category: "self", summary: "SSA-389290: Third-Party Component Vulnerabilities in SINEC INS - CSAF Version", url: "https://cert-portal.siemens.com/productcert/csaf/ssa-389290.json", }, { category: "self", summary: "SSA-389290: Third-Party Component Vulnerabilities in SINEC INS - TXT Version", url: "https://cert-portal.siemens.com/productcert/txt/ssa-389290.txt", }, { category: "self", summary: "SSA-389290: Third-Party Component Vulnerabilities in SINEC INS - PDF Version", url: "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf", }, { category: "self", summary: "ICS Advisory ICSA-22-069-09 JSON", url: "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2022/icsa-22-069-09.json", }, { category: "self", summary: "ICS Advisory ICSA-22-069-09 - Web Version", url: "https://www.cisa.gov/news-events/ics-advisories/icsa-22-069-09", }, { category: "external", summary: "Recommended Practices", url: "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01", }, { category: "external", summary: "Recommended Practices", url: "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices", }, { category: "external", summary: "Recommended Practices", url: "https://www.cisa.gov/topics/industrial-control-systems", }, { category: "external", summary: "Recommended Practices", url: "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf", }, { category: "external", summary: "Recommended Practices", url: "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf", }, { category: "external", summary: "Recommended Practices", url: "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B", }, ], title: "Siemens SINEC INS", tracking: { current_release_date: "2022-03-08T00:00:00.000000Z", generator: { engine: { name: "CISA CSAF Generator", version: "1.0.0", }, }, id: "ICSA-22-069-09", initial_release_date: "2022-03-08T00:00:00.000000Z", revision_history: [ { date: "2022-03-08T00:00:00.000000Z", legacy_version: "1.0", number: "1", summary: "Publication Date", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version_range", name: "<V1.0.1.1", product: { name: "SINEC INS", product_id: "CSAFPID-0001", }, }, ], category: "product_name", name: "SINEC INS", }, ], category: "vendor", name: "Siemens", }, ], }, vulnerabilities: [ { cve: "CVE-2019-19242", cwe: { id: "CWE-476", name: "NULL Pointer Dereference", }, notes: [ { category: "summary", text: "SQLite 3.30.1 mishandles pExpr->y.pTab, as demonstrated by the TK_COLUMN case in sqlite3ExprCodeTarget in expr.c.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2019-19242 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2019-19242 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-19242.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2019-19242", }, { cve: "CVE-2019-19244", cwe: { id: "CWE-20", name: "Improper Input Validation", }, notes: [ { category: "summary", text: "Select in select.c in SQLite 3.30.1 allows a crash if a sub-select uses both DISTINCT and window functions, and also has certain ORDER BY usage.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2019-19244 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2019-19244 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-19244.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2019-19244", }, { cve: "CVE-2019-19317", cwe: { id: "CWE-681", name: "Incorrect Conversion between Numeric Types", }, notes: [ { category: "summary", text: "lookupName in resolve.c in SQLite 3.30.1 omits bits from the colUsed bitmask in the case of a generated column, which allows attackers to cause a denial of service or possibly have unspecified other impact.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2019-19317 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2019-19317 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-19317.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2019-19317", }, { cve: "CVE-2019-19603", cwe: { id: "CWE-20", name: "Improper Input Validation", }, notes: [ { category: "summary", text: "SQLite 3.30.1 mishandles certain SELECT statements with a nonexistent VIEW, leading to an application crash.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2019-19603 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2019-19603 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-19603.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2019-19603", }, { cve: "CVE-2019-19645", cwe: { id: "CWE-674", name: "Uncontrolled Recursion", }, notes: [ { category: "summary", text: "alter.c in SQLite through 3.30.1 allows attackers to trigger infinite recursion via certain types of self-referential views in conjunction with ALTER TABLE statements.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2019-19645 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2019-19645 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-19645.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2019-19645", }, { cve: "CVE-2019-19646", cwe: { id: "CWE-754", name: "Improper Check for Unusual or Exceptional Conditions", }, notes: [ { category: "summary", text: "pragma.c in SQLite through 3.30.1 mishandles NOT NULL in an integrity_check PRAGMA command in certain cases of generated columns.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2019-19646 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2019-19646 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-19646.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2019-19646", }, { cve: "CVE-2019-19880", cwe: { id: "CWE-476", name: "NULL Pointer Dereference", }, notes: [ { category: "summary", text: "exprListAppendList in window.c in SQLite 3.30.1 allows attackers to trigger an invalid pointer dereference because constant integer values in ORDER BY clauses of window definitions are mishandled.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2019-19880 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2019-19880 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-19880.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2019-19880", }, { cve: "CVE-2019-19923", cwe: { id: "CWE-476", name: "NULL Pointer Dereference", }, notes: [ { category: "summary", text: "flattenSubquery in select.c in SQLite 3.30.1 mishandles certain uses of SELECT DISTINCT involving a LEFT JOIN in which the right-hand side is a view. This can cause a NULL pointer dereference (or incorrect results).", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2019-19923 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2019-19923 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-19923.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2019-19923", }, { cve: "CVE-2019-19924", cwe: { id: "CWE-755", name: "Improper Handling of Exceptional Conditions", }, notes: [ { category: "summary", text: "SQLite 3.30.1 mishandles certain parser-tree rewriting, related to expr.c, vdbeaux.c, and window.c. This is caused by incorrect sqlite3WindowRewrite() error handling.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2019-19924 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2019-19924 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-19924.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2019-19924", }, { cve: "CVE-2019-19925", cwe: { id: "CWE-434", name: "Unrestricted Upload of File with Dangerous Type", }, notes: [ { category: "summary", text: "zipfileUpdate in ext/misc/zipfile.c in SQLite 3.30.1 mishandles a NULL pathname during an update of a ZIP archive.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2019-19925 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2019-19925 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-19925.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2019-19925", }, { cve: "CVE-2019-19926", cwe: { id: "CWE-476", name: "NULL Pointer Dereference", }, notes: [ { category: "summary", text: "multiSelect in select.c in SQLite 3.30.1 mishandles certain errors during parsing, as demonstrated by errors from sqlite3WindowRewrite() calls. NOTE: this vulnerability exists because of an incomplete fix for CVE-2019-19880.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2019-19926 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2019-19926 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-19926.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2019-19926", }, { cve: "CVE-2020-1971", cwe: { id: "CWE-476", name: "NULL Pointer Dereference", }, notes: [ { category: "summary", text: "The X.509 GeneralName type is a generic type for representing different types of names. One of those name types is known as EDIPartyName. OpenSSL provides a function GENERAL_NAME_cmp which compares different instances of a GENERAL_NAME to see if they are equal or not. This function behaves incorrectly when both GENERAL_NAMEs contain an EDIPARTYNAME. A NULL pointer dereference and a crash may occur leading to a possible denial of service attack. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes: 1) Comparing CRL distribution point names between an available CRL and a CRL distribution point embedded in an X509 certificate 2) When verifying that a timestamp response token signer matches the timestamp authority name (exposed via the API functions TS_RESP_verify_response and TS_RESP_verify_token) If an attacker can control both items being compared then that attacker could trigger a crash. For example if the attacker can trick a client or server into checking a malicious certificate against a malicious CRL then this may occur. Note that some applications automatically download CRLs based on a URL embedded in a certificate. This checking happens prior to the signatures on the certificate and CRL being verified. OpenSSL's s_server, s_client and verify tools have support for the \"-crl_download\" option which implements automatic CRL downloading and this attack has been demonstrated to work against those tools. Note that an unrelated bug means that affected versions of OpenSSL cannot parse or construct correct encodings of EDIPARTYNAME. However it is possible to construct a malformed EDIPARTYNAME that OpenSSL's parser will accept and hence trigger this attack. All OpenSSL 1.1.1 and 1.0.2 versions are affected by this issue. Other OpenSSL releases are out of support and have not been checked. Fixed in OpenSSL 1.1.1i (Affected 1.1.1-1.1.1h). Fixed in OpenSSL 1.0.2x (Affected 1.0.2-1.0.2w).", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2020-1971 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2020-1971 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-1971.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2020-1971", }, { cve: "CVE-2020-7774", cwe: { id: "CWE-915", name: "Improperly Controlled Modification of Dynamically-Determined Object Attributes", }, notes: [ { category: "summary", text: "This affects the package y18n before 3.2.2, 4.0.1 and 5.0.5. PoC by po6ix: const y18n = require('y18n')(); y18n.setLocale('PROTO'); y18n.updateLocale({polluted: true}); console.log(polluted); // true", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2020-7774 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2020-7774 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-7774.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 7.3, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2020-7774", }, { cve: "CVE-2020-8169", cwe: { id: "CWE-200", name: "Exposure of Sensitive Information to an Unauthorized Actor", }, notes: [ { category: "summary", text: "The libcurl library versions 7.62.0 to and including 7.70.0 are vulnerable to an information disclosure vulnerability that can lead to a partial password being leaked over the network and to the DNS server(s).", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2020-8169 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2020-8169 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-8169.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2020-8169", }, { cve: "CVE-2020-8177", cwe: { id: "CWE-74", name: "Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')", }, notes: [ { category: "summary", text: "curl 7.20.0 through 7.70.0 is vulnerable to improper restriction of names for files and other resources that can lead too overwriting a local file when the -J flag is used.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2020-8177 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2020-8177 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-8177.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 7.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2020-8177", }, { cve: "CVE-2020-8231", cwe: { id: "CWE-416", name: "Use After Free", }, notes: [ { category: "summary", text: "Due to use of a dangling pointer, libcurl 7.29.0 through 7.71.1 can use the wrong connection when sending data.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2020-8231 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2020-8231 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-8231.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2020-8231", }, { cve: "CVE-2020-8265", cwe: { id: "CWE-416", name: "Use After Free", }, notes: [ { category: "summary", text: "Node.js versions before 10.23.1, 12.20.1, 14.15.4, 15.5.1 are vulnerable to a use-after-free bug in its TLS implementation. When writing to a TLS enabled socket, node::StreamBase::Write calls node::TLSWrap::DoWrite with a freshly allocated WriteWrap object as first argument. If the DoWrite method does not return an error, this object is passed back to the caller as part of a StreamWriteResult structure. This may be exploited to corrupt memory leading to a Denial of Service or potentially other exploits.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2020-8265 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2020-8265 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-8265.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2020-8265", }, { cve: "CVE-2020-8284", cwe: { id: "CWE-200", name: "Exposure of Sensitive Information to an Unauthorized Actor", }, notes: [ { category: "summary", text: "A malicious server can use the FTP PASV response to trick curl 7.73.0 and earlier into connecting back to a given IP address and port, and this way potentially make curl extract information about services that are otherwise private and not disclosed, for example doing port scanning and service banner extractions.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2020-8284 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2020-8284 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-8284.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2020-8284", }, { cve: "CVE-2020-8285", cwe: { id: "CWE-674", name: "Uncontrolled Recursion", }, notes: [ { category: "summary", text: "curl 7.21.0 to and including 7.73.0 is vulnerable to uncontrolled recursion due to a stack overflow issue in FTP wildcard match parsing.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2020-8285 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2020-8285 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-8285.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2020-8285", }, { cve: "CVE-2020-8286", cwe: { id: "CWE-295", name: "Improper Certificate Validation", }, notes: [ { category: "summary", text: "The libcurl library versions 7.41.0 to and including 7.73.0 are vulnerable to an improper check for certificate revocation due to insufficient verification of the OCSP response. This vulnerability could allow an attacker to pass a revoked certificate as valid.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2020-8286 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2020-8286 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-8286.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2020-8286", }, { cve: "CVE-2020-8287", cwe: { id: "CWE-444", name: "Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')", }, notes: [ { category: "summary", text: "Node.js versions before 10.23.1, 12.20.1, 14.15.4, 15.5.1 allow two copies of a header field in an HTTP request (for example, two Transfer-Encoding header fields). In this case, Node.js identifies the first header field and ignores the second. This can lead to HTTP Request Smuggling.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2020-8287 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2020-8287 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-8287.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2020-8287", }, { cve: "CVE-2020-8625", cwe: { id: "CWE-120", name: "Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')", }, notes: [ { category: "summary", text: "BIND servers are vulnerable if they are running an affected version and are configured to use GSS-TSIG features. In a configuration which uses BIND's default settings the vulnerable code path is not exposed, but a server can be rendered vulnerable by explicitly setting valid values for the tkey-gssapi-keytab or tkey-gssapi-credentialconfiguration options. Although the default configuration is not vulnerable, GSS-TSIG is frequently used in networks where BIND is integrated with Samba, as well as in mixed-server environments that combine BIND servers with Active Directory domain controllers. The most likely outcome of a successful exploitation of the vulnerability is a crash of the named process. However, remote code execution, while unproven, is theoretically possible. Affects: BIND 9.5.0 -> 9.11.27, 9.12.0 -> 9.16.11, and versions BIND 9.11.3-S1 -> 9.11.27-S1 and 9.16.8-S1 -> 9.16.11-S1 of BIND Supported Preview Edition. Also release versions 9.17.0 -> 9.17.1 of the BIND 9.17 development branch", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2020-8625 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2020-8625 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-8625.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2020-8625", }, { cve: "CVE-2020-9327", cwe: { id: "CWE-476", name: "NULL Pointer Dereference", }, notes: [ { category: "summary", text: "In SQLite 3.31.1, isAuxiliaryVtabOperator allows attackers to trigger a NULL pointer dereference and segmentation fault because of generated column optimizations.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2020-9327 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2020-9327 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-9327.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2020-9327", }, { cve: "CVE-2020-11655", cwe: { id: "CWE-665", name: "Improper Initialization", }, notes: [ { category: "summary", text: "SQLite through 3.31.1 allows attackers to cause a denial of service (segmentation fault) via a malformed window-function query because the AggInfo object's initialization is mishandled.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2020-11655 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2020-11655 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-11655.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2020-11655", }, { cve: "CVE-2020-11656", cwe: { id: "CWE-416", name: "Use After Free", }, notes: [ { category: "summary", text: "In SQLite through 3.31.1, the ALTER TABLE implementation has a use-after-free, as demonstrated by an ORDER BY clause that belongs to a compound SELECT statement.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2020-11656 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2020-11656 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-11656.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2020-11656", }, { cve: "CVE-2020-13630", cwe: { id: "CWE-416", name: "Use After Free", }, notes: [ { category: "summary", text: "ext/fts3/fts3.c in SQLite before 3.32.0 has a use-after-free in fts3EvalNextRow, related to the snippet feature.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2020-13630 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2020-13630 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-13630.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2020-13630", }, { cve: "CVE-2020-13631", cwe: { id: "CWE-20", name: "Improper Input Validation", }, notes: [ { category: "summary", text: "SQLite before 3.32.0 allows a virtual table to be renamed to the name of one of its shadow tables, related to alter.c and build.c.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2020-13631 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2020-13631 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-13631.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2020-13631", }, { cve: "CVE-2020-13632", cwe: { id: "CWE-476", name: "NULL Pointer Dereference", }, notes: [ { category: "summary", text: "ext/fts3/fts3_snippet.c in SQLite before 3.32.0 has a NULL pointer dereference via a crafted matchinfo() query.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2020-13632 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2020-13632 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-13632.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2020-13632", }, { cve: "CVE-2020-13871", cwe: { id: "CWE-416", name: "Use After Free", }, notes: [ { category: "summary", text: "SQLite 3.32.2 has a use-after-free in resetAccumulator in select.c because the parse tree rewrite for window functions is too late.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2020-13871 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2020-13871 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-13871.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2020-13871", }, { cve: "CVE-2020-15358", cwe: { id: "CWE-787", name: "Out-of-bounds Write", }, notes: [ { category: "summary", text: "In SQLite before 3.32.3, select.c mishandles query-flattener optimization, leading to a multiSelectOrderBy heap overflow because of misuse of transitive properties for constant propagation.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2020-15358 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2020-15358 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-15358.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2020-15358", }, { cve: "CVE-2020-27304", cwe: { id: "CWE-22", name: "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", }, notes: [ { category: "summary", text: "The CivetWeb web library does not validate uploaded filepaths when running on an OS other than Windows, when using the built-in HTTP form-based file upload mechanism, via the mg_handle_form_request API. Web applications that use the file upload form handler, and use parts of the user-controlled filename in the output path, are susceptible to directory traversal", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2020-27304 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2020-27304 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-27304.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2020-27304", }, { cve: "CVE-2021-3449", cwe: { id: "CWE-476", name: "NULL Pointer Dereference", }, notes: [ { category: "summary", text: "An OpenSSL TLS server may crash if sent a maliciously crafted renegotiation ClientHello message from a client. If a TLSv1.2 renegotiation ClientHello omits the signature_algorithms extension (where it was present in the initial ClientHello), but includes a signature_algorithms_cert extension then a NULL pointer dereference will result, leading to a crash and a denial of service attack. A server is only vulnerable if it has TLSv1.2 and renegotiation enabled (which is the default configuration). OpenSSL TLS clients are not impacted by this issue. All OpenSSL 1.1.1 versions are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1-1.1.1j).", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2021-3449 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2021-3449 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-3449.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2021-3449", }, { cve: "CVE-2021-3450", cwe: { id: "CWE-295", name: "Improper Certificate Validation", }, notes: [ { category: "summary", text: "The X509_V_FLAG_X509_STRICT flag enables additional security checks of the certificates present in a certificate chain. It is not set by default. Starting from OpenSSL version 1.1.1h a check to disallow certificates in the chain that have explicitly encoded elliptic curve parameters was added as an additional strict check. An error in the implementation of this check meant that the result of a previous check to confirm that certificates in the chain are valid CA certificates was overwritten. This effectively bypasses the check that non-CA certificates must not be able to issue other certificates. If a \"purpose\" has been configured then there is a subsequent opportunity for checks that the certificate is a valid CA. All of the named \"purpose\" values implemented in libcrypto perform this check. Therefore, where a purpose is set the certificate chain will still be rejected even when the strict flag has been used. A purpose is set by default in libssl client and server certificate verification routines, but it can be overridden or removed by an application. In order to be affected, an application must explicitly set the X509_V_FLAG_X509_STRICT verification flag and either not set a purpose for the certificate verification or, in the case of TLS client or server applications, override the default purpose. OpenSSL versions 1.1.1h and newer are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1h-1.1.1j).", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2021-3450 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2021-3450 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-3450.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2021-3450", }, { cve: "CVE-2021-3672", cwe: { id: "CWE-79", name: "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", }, notes: [ { category: "summary", text: "A flaw was found in c-ares library, where a missing input validation check of host names returned by DNS (Domain Name Servers) can lead to output of wrong hostnames which might potentially lead to Domain Hijacking. The highest threat from this vulnerability is to confidentiality and integrity as well as system availability.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2021-3672 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2021-3672 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-3672.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 5.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2021-3672", }, { cve: "CVE-2021-3711", cwe: { id: "CWE-120", name: "Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')", }, notes: [ { category: "summary", text: "In order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the \"out\" parameter can be NULL and, on exit, the \"outlen\" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the \"out\" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen data to overflow the buffer by up to a maximum of 62 bytes altering the contents of other data held after the buffer, possibly changing application behaviour or causing the application to crash. The location of the buffer is application dependent but is typically heap allocated. Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k).", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2021-3711 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2021-3711 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-3711.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2021-3711", }, { cve: "CVE-2021-3712", cwe: { id: "CWE-125", name: "Out-of-bounds Read", }, notes: [ { category: "summary", text: "ASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a strict requirement, ASN.1 strings that are parsed using OpenSSL's own \"d2i\" functions (and other similar parsing functions) as well as any string whose value has been set with the ASN1_STRING_set() function will additionally NUL terminate the byte array in the ASN1_STRING structure. However, it is possible for applications to directly construct valid ASN1_STRING structures which do not NUL terminate the byte array by directly setting the \"data\" and \"length\" fields in the ASN1_STRING array. This can also happen by using the ASN1_STRING_set0() function. Numerous OpenSSL functions that print ASN.1 data have been found to assume that the ASN1_STRING byte array will be NUL terminated, even though this is not guaranteed for strings that have been directly constructed. Where an application requests an ASN.1 structure to be printed, and where that ASN.1 structure contains ASN1_STRINGs that have been directly constructed by the application without NUL terminating the \"data\" field, then a read buffer overrun can occur. The same thing can also occur during name constraints processing of certificates (for example if a certificate has been directly constructed by the application instead of loading it via the OpenSSL parsing functions, and the certificate contains non NUL terminated ASN1_STRING structures). It can also occur in the X509_get1_email(), X509_REQ_get1_email() and X509_get1_ocsp() functions. If a malicious actor can cause an application to directly construct an ASN1_STRING and then process it through one of the affected OpenSSL functions then this issue could be hit. This might result in a crash (causing a Denial of Service attack). It could also result in the disclosure of private memory contents (such as private keys, or sensitive plaintext). Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k). Fixed in OpenSSL 1.0.2za (Affected 1.0.2-1.0.2y).", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2021-3712 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2021-3712 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-3712.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2021-3712", }, { cve: "CVE-2021-22876", cwe: { id: "CWE-200", name: "Exposure of Sensitive Information to an Unauthorized Actor", }, notes: [ { category: "summary", text: "curl 7.1.1 to and including 7.75.0 is vulnerable to an \"Exposure of Private Personal Information to an Unauthorized Actor\" by leaking credentials in the HTTP Referer: header. libcurl does not strip off user credentials from the URL when automatically populating the Referer: HTTP request header field in outgoing HTTP requests, and therefore risks leaking sensitive data to the server that is the target of the second HTTP request.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2021-22876 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2021-22876 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22876.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2021-22876", }, { cve: "CVE-2021-22883", cwe: { id: "CWE-400", name: "Uncontrolled Resource Consumption", }, notes: [ { category: "summary", text: "Node.js before 10.24.0, 12.21.0, 14.16.0, and 15.10.0 is vulnerable to a denial of service attack when too many connection attempts with an 'unknownProtocol' are established. This leads to a leak of file descriptors. If a file descriptor limit is configured on the system, then the server is unable to accept new connections and prevent the process also from opening, e.g. a file. If no file descriptor limit is configured, then this lead to an excessive memory usage and cause the system to run out of memory.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2021-22883 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2021-22883 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22883.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2021-22883", }, { cve: "CVE-2021-22884", cwe: { id: "CWE-20", name: "Improper Input Validation", }, notes: [ { category: "summary", text: "Node.js before 10.24.0, 12.21.0, 14.16.0, and 15.10.0 is vulnerable to DNS rebinding attacks as the whitelist includes “localhost6”. When “localhost6” is not present in /etc/hosts, it is just an ordinary domain that is resolved via DNS, i.e., over network. If the attacker controls the victim's DNS server or can spoof its responses, the DNS rebinding protection can be bypassed by using the “localhost6” domain. As long as the attacker uses the “localhost6” domain, they can still apply the attack described in CVE-2018-7160.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2021-22884 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2021-22884 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22884.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2021-22884", }, { cve: "CVE-2021-22890", cwe: { id: "CWE-290", name: "Authentication Bypass by Spoofing", }, notes: [ { category: "summary", text: "curl 7.63.0 to and including 7.75.0 includes vulnerability that allows a malicious HTTPS proxy to MITM a connection due to bad handling of TLS 1.3 session tickets. When using a HTTPS proxy and TLS 1.3, libcurl can confuse session tickets arriving from the HTTPS proxy but work as if they arrived from the remote server and then wrongly \"short-cut\" the host handshake. When confusing the tickets, a HTTPS proxy can trick libcurl to use the wrong session ticket resume for the host and thereby circumvent the server TLS certificate check and make a MITM attack to be possible to perform unnoticed. Note that such a malicious HTTPS proxy needs to provide a certificate that curl will accept for the MITMed server for an attack to work - unless curl has been told to ignore the server certificate check.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2021-22890 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2021-22890 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22890.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2021-22890", }, { cve: "CVE-2021-22897", cwe: { id: "CWE-668", name: "Exposure of Resource to Wrong Sphere", }, notes: [ { category: "summary", text: "curl 7.61.0 through 7.76.1 suffers from exposure of data element to wrong session due to a mistake in the code for CURLOPT_SSL_CIPHER_LIST when libcurl is built to use the Schannel TLS library. The selected cipher set was stored in a single \"static\" variable in the library, which has the surprising side-effect that if an application sets up multiple concurrent transfers, the last one that sets the ciphers will accidentally control the set used by all transfers. In a worst-case scenario, this weakens transport security significantly.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2021-22897 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2021-22897 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22897.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2021-22897", }, { cve: "CVE-2021-22898", cwe: { id: "CWE-909", name: "Missing Initialization of Resource", }, notes: [ { category: "summary", text: "curl 7.7 through 7.76.1 suffers from an information disclosure when the -t command line option, known as CURLOPT_TELNETOPTIONS in libcurl, is used to send variable=content pairs to TELNET servers. Due to a flaw in the option parser for sending NEW_ENV variables, libcurl could be made to pass on uninitialized data from a stack based buffer to the server, resulting in potentially revealing sensitive internal information to the server using a clear-text network protocol.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2021-22898 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2021-22898 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22898.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 3.1, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2021-22898", }, { cve: "CVE-2021-22901", cwe: { id: "CWE-416", name: "Use After Free", }, notes: [ { category: "summary", text: "curl 7.75.0 through 7.76.1 suffers from a use-after-free vulnerability resulting in already freed memory being used when a TLS 1.3 session ticket arrives over a connection. A malicious server can use this in rare unfortunate circumstances to potentially reach remote code execution in the client. When libcurl at run-time sets up support for TLS 1.3 session tickets on a connection using OpenSSL, it stores pointers to the transfer in-memory object for later retrieval when a session ticket arrives. If the connection is used by multiple transfers (like with a reused HTTP/1.1 connection or multiplexed HTTP/2 connection) that first transfer object might be freed before the new session is established on that connection and then the function will access a memory buffer that might be freed. When using that memory, libcurl might even call a function pointer in the object, making it possible for a remote code execution if the server could somehow manage to get crafted memory content into the correct place in memory.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2021-22901 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2021-22901 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22901.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2021-22901", }, { cve: "CVE-2021-22918", cwe: { id: "CWE-125", name: "Out-of-bounds Read", }, notes: [ { category: "summary", text: "Node.js before 16.4.1, 14.17.2, 12.22.2 is vulnerable to an out-of-bounds read when uv__idna_toascii() is used to convert strings to ASCII. The pointer p is read and increased without checking whether it is beyond pe, with the latter holding a pointer to the end of the buffer. This can lead to information disclosures or crashes. This function can be triggered via uv_getaddrinfo().", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2021-22918 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2021-22918 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22918.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2021-22918", }, { cve: "CVE-2021-22921", cwe: { id: "CWE-732", name: "Incorrect Permission Assignment for Critical Resource", }, notes: [ { category: "summary", text: "Node.js before 16.4.1, 14.17.2, and 12.22.2 is vulnerable to local privilege escalation attacks under certain conditions on Windows platforms. More specifically, improper configuration of permissions in the installation directory allows an attacker to perform two different escalation attacks: PATH and DLL hijacking.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2021-22921 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2021-22921 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22921.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2021-22921", }, { cve: "CVE-2021-22922", cwe: { id: "CWE-354", name: "Improper Validation of Integrity Check Value", }, notes: [ { category: "summary", text: "When curl is instructed to download content using the metalink feature, thecontents is verified against a hash provided in the metalink XML file.The metalink XML file points out to the client how to get the same contentfrom a set of different URLs, potentially hosted by different servers and theclient can then download the file from one or several of them. In a serial orparallel manner.If one of the servers hosting the contents has been breached and the contentsof the specific file on that server is replaced with a modified payload, curlshould detect this when the hash of the file mismatches after a completeddownload. It should remove the contents and instead try getting the contentsfrom another URL. This is not done, and instead such a hash mismatch is onlymentioned in text and the potentially malicious content is kept in the file ondisk.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2021-22922 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2021-22922 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22922.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2021-22922", }, { cve: "CVE-2021-22923", cwe: { id: "CWE-522", name: "Insufficiently Protected Credentials", }, notes: [ { category: "summary", text: "When curl is instructed to get content using the metalink feature, and a user name and password are used to download the metalink XML file, those same credentials are then subsequently passed on to each of the servers from which curl will download or try to download the contents from. Often contrary to the user's expectations and intentions and without telling the user it happened.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2021-22923 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2021-22923 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22923.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2021-22923", }, { cve: "CVE-2021-22924", cwe: { id: "CWE-706", name: "Use of Incorrectly-Resolved Name or Reference", }, notes: [ { category: "summary", text: "libcurl keeps previously used connections in a connection pool for subsequent transfers to reuse, if one of them matches the setup. Due to errors in the logic, the config matching function did not take 'issuercert' into account and it compared the involved paths _case insensitively_,which could lead to libcurl reusing wrong connections. File paths are, or can be, case sensitive on many systems but not all, and can even vary depending on used file systems. The comparison also didn't include the 'issuer cert' which a transfer can set to qualify how to verify the server certificate.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2021-22924 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2021-22924 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22924.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2021-22924", }, { cve: "CVE-2021-22925", cwe: { id: "CWE-908", name: "Use of Uninitialized Resource", }, notes: [ { category: "summary", text: "curl supports the -t command line option, known as CURLOPT_TELNETOPTIONSin libcurl. This rarely used option is used to send variable=content pairs toTELNET servers.Due to flaw in the option parser for sending NEW_ENV variables, libcurlcould be made to pass on uninitialized data from a stack based buffer to theserver. Therefore potentially revealing sensitive internal information to theserver using a clear-text network protocol.This could happen because curl did not call and use sscanf() correctly whenparsing the string provided by the application.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2021-22925 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2021-22925 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22925.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2021-22925", }, { cve: "CVE-2021-22926", cwe: { id: "CWE-295", name: "Improper Certificate Validation", }, notes: [ { category: "summary", text: "libcurl-using applications can ask for a specific client certificate to be used in a transfer. This is done with the CURLOPT_SSLCERT option (--cert with the command line tool).When libcurl is built to use the macOS native TLS library Secure Transport, an application can ask for the client certificate by name or with a file name - using the same option. If the name exists as a file, it will be used instead of by name.If the appliction runs with a current working directory that is writable by other users (like /tmp), a malicious user can create a file name with the same name as the app wants to use by name, and thereby trick the application to use the file based cert instead of the one referred to by name making libcurl send the wrong client certificate in the TLS connection handshake.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2021-22926 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2021-22926 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22926.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2021-22926", }, { cve: "CVE-2021-22930", cwe: { id: "CWE-416", name: "Use After Free", }, notes: [ { category: "summary", text: "Node.js before 16.6.0, 14.17.4, and 12.22.4 is vulnerable to a use after free attack where an attacker might be able to exploit the memory corruption, to change process behavior.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2021-22930 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2021-22930 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22930.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2021-22930", }, { cve: "CVE-2021-22931", cwe: { id: "CWE-20", name: "Improper Input Validation", }, notes: [ { category: "summary", text: "Node.js before 16.6.0, 14.17.4, and 12.22.4 is vulnerable to Remote Code Execution, XSS, Application crashes due to missing input validation of host names returned by Domain Name Servers in Node.js dns library which can lead to output of wrong hostnames (leading to Domain Hijacking) and injection vulnerabilities in applications using the library.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2021-22931 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2021-22931 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22931.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2021-22931", }, { cve: "CVE-2021-22939", cwe: { id: "CWE-295", name: "Improper Certificate Validation", }, notes: [ { category: "summary", text: "If the Node.js https API was used incorrectly and \"undefined\" was in passed for the \"rejectUnauthorized\" parameter, no error was returned and connections to servers with an expired certificate would have been accepted.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2021-22939 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2021-22939 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22939.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2021-22939", }, { cve: "CVE-2021-22940", cwe: { id: "CWE-416", name: "Use After Free", }, notes: [ { category: "summary", text: "Node.js before 16.6.1, 14.17.5, and 12.22.5 is vulnerable to a use after free attack where an attacker might be able to exploit the memory corruption, to change process behavior.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2021-22940 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2021-22940 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22940.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2021-22940", }, { cve: "CVE-2021-22945", cwe: { id: "CWE-415", name: "Double Free", }, notes: [ { category: "summary", text: "When sending data to an MQTT server, libcurl <= 7.73.0 and 7.78.0 could in some circumstances erroneously keep a pointer to an already freed memory area and both use that again in a subsequent call to send data and also free it _again_.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2021-22945 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2021-22945 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22945.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 9.1, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2021-22945", }, { cve: "CVE-2021-22946", cwe: { id: "CWE-319", name: "Cleartext Transmission of Sensitive Information", }, notes: [ { category: "summary", text: "A user can tell curl >= 7.20.0 and <= 7.78.0 to require a successful upgrade to TLS when speaking to an IMAP, POP3 or FTP server (--ssl-reqd on the command line orCURLOPT_USE_SSL set to CURLUSESSL_CONTROL or CURLUSESSL_ALL withlibcurl). This requirement could be bypassed if the server would return a properly crafted but perfectly legitimate response.This flaw would then make curl silently continue its operations WITHOUTTLS contrary to the instructions and expectations, exposing possibly sensitive data in clear text over the network.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2021-22946 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2021-22946 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22946.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2021-22946", }, { cve: "CVE-2021-22947", cwe: { id: "CWE-345", name: "Insufficient Verification of Data Authenticity", }, notes: [ { category: "summary", text: "When curl >= 7.20.0 and <= 7.78.0 connects to an IMAP or POP3 server to retrieve data using STARTTLS to upgrade to TLS security, the server can respond and send back multiple responses at once that curl caches. curl would then upgrade to TLS but not flush the in-queue of cached responses but instead continue using and trustingthe responses it got _before_ the TLS handshake as if they were authenticated.Using this flaw, it allows a Man-In-The-Middle attacker to first inject the fake responses, then pass-through the TLS traffic from the legitimate server and trick curl into sending data back to the user thinking the attacker's injected data comes from the TLS-protected server.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2021-22947 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2021-22947 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22947.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2021-22947", }, { cve: "CVE-2021-23362", cwe: { id: "CWE-20", name: "Improper Input Validation", }, notes: [ { category: "summary", text: "The package hosted-git-info before 3.0.8 are vulnerable to Regular Expression Denial of Service (ReDoS) via regular expression shortcutMatch in the fromUrl function in index.js. The affected regular expression exhibits polynomial worst-case time complexity.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2021-23362 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2021-23362 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-23362.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2021-23362", }, { cve: "CVE-2021-23840", cwe: { id: "CWE-190", name: "Integer Overflow or Wraparound", }, notes: [ { category: "summary", text: "Calls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissable length for an integer on the platform. In such cases the return value from the function call will be 1 (indicating success), but the output length value will be negative. This could cause applications to behave incorrectly or crash. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2021-23840 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2021-23840 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-23840.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2021-23840", }, { cve: "CVE-2021-25214", cwe: { id: "CWE-617", name: "Reachable Assertion", }, notes: [ { category: "summary", text: "In BIND 9.8.5 -> 9.8.8, 9.9.3 -> 9.11.29, 9.12.0 -> 9.16.13, and versions BIND 9.9.3-S1 -> 9.11.29-S1 and 9.16.8-S1 -> 9.16.13-S1 of BIND 9 Supported Preview Edition, as well as release versions 9.17.0 -> 9.17.11 of the BIND 9.17 development branch, when a vulnerable version of named receives a malformed IXFR triggering the flaw described above, the named process will terminate due to a failed assertion the next time the transferred secondary zone is refreshed.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2021-25214 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2021-25214 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-25214.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2021-25214", }, { cve: "CVE-2021-25215", cwe: { id: "CWE-617", name: "Reachable Assertion", }, notes: [ { category: "summary", text: "In BIND 9.0.0 -> 9.11.29, 9.12.0 -> 9.16.13, and versions BIND 9.9.3-S1 -> 9.11.29-S1 and 9.16.8-S1 -> 9.16.13-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -> 9.17.11 of the BIND 9.17 development branch, when a vulnerable version of named receives a query for a record triggering the flaw described above, the named process will terminate due to a failed assertion check. The vulnerability affects all currently maintained BIND 9 branches (9.11, 9.11-S, 9.16, 9.16-S, 9.17) as well as all other versions of BIND 9.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2021-25215 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2021-25215 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-25215.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2021-25215", }, { cve: "CVE-2021-25216", cwe: { id: "CWE-617", name: "Reachable Assertion", }, notes: [ { category: "summary", text: "In BIND 9.5.0 -> 9.11.29, 9.12.0 -> 9.16.13, and versions BIND 9.11.3-S1 -> 9.11.29-S1 and 9.16.8-S1 -> 9.16.13-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -> 9.17.1 of the BIND 9.17 development branch, BIND servers are vulnerable if they are running an affected version and are configured to use GSS-TSIG features. In a configuration which uses BIND's default settings the vulnerable code path is not exposed, but a server can be rendered vulnerable by explicitly setting values for the tkey-gssapi-keytab or tkey-gssapi-credential configuration options. Although the default configuration is not vulnerable, GSS-TSIG is frequently used in networks where BIND is integrated with Samba, as well as in mixed-server environments that combine BIND servers with Active Directory domain controllers. For servers that meet these conditions, the ISC SPNEGO implementation is vulnerable to various attacks, depending on the CPU architecture for which BIND was built: For named binaries compiled for 64-bit platforms, this flaw can be used to trigger a buffer over-read, leading to a server crash. For named binaries compiled for 32-bit platforms, this flaw can be used to trigger a server crash due to a buffer overflow and possibly also to achieve remote code execution. We have determined that standard SPNEGO implementations are available in the MIT and Heimdal Kerberos libraries, which support a broad range of operating systems, rendering the ISC implementation unnecessary and obsolete. Therefore, to reduce the attack surface for BIND users, we will be removing the ISC SPNEGO implementation in the April releases of BIND 9.11 and 9.16 (it had already been dropped from BIND 9.17). We would not normally remove something from a stable ESV (Extended Support Version) of BIND, but since system libraries can replace the ISC SPNEGO implementation, we have made an exception in this case for reasons of stability and security.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2021-25216 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2021-25216 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-25216.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2021-25216", }, { cve: "CVE-2021-25219", cwe: { id: "CWE-20", name: "Improper Input Validation", }, notes: [ { category: "summary", text: "In BIND 9.3.0 -> 9.11.35, 9.12.0 -> 9.16.21, and versions 9.9.3-S1 -> 9.11.35-S1 and 9.16.8-S1 -> 9.16.21-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -> 9.17.18 of the BIND 9.17 development branch, exploitation of broken authoritative servers using a flaw in response processing can cause degradation in BIND resolver performance. The way the lame cache is currently designed makes it possible for its internal data structures to grow almost infinitely, which may cause significant delays in client query processing.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2021-25219 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2021-25219 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-25219.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2021-25219", }, { cve: "CVE-2021-27290", cwe: { id: "CWE-20", name: "Improper Input Validation", }, notes: [ { category: "summary", text: "ssri 5.2.2-8.0.0, fixed in 8.0.1, processes SRIs using a regular expression which is vulnerable to a denial of service. Malicious SRIs could take an extremely long time to process, leading to denial of service. This issue only affects consumers using the strict option.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2021-27290 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2021-27290 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-27290.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2021-27290", }, { cve: "CVE-2021-32803", cwe: { id: "CWE-22", name: "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", }, notes: [ { category: "summary", text: "The npm package \"tar\" (aka node-tar) before versions 6.1.2, 5.0.7, 4.4.15, and 3.2.3 has an arbitrary File Creation/Overwrite vulnerability via insufficient symlink protection. node-tar aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary stat calls to determine whether a given path is a directory, paths are cached when directories are created. This logic was insufficient when extracting tar files that contained both a directory and a symlink with the same name as the directory. This order of operations resulted in the directory being created and added to the node-tar directory cache. When a directory is present in the directory cache, subsequent calls to mkdir for that directory are skipped. However, this is also where node-tar checks for symlinks occur. By first creating a directory, and then replacing that directory with a symlink, it was thus possible to bypass node-tar symlink checks on directories, essentially allowing an untrusted tar file to symlink into an arbitrary location and subsequently extracting arbitrary files into that location, thus allowing arbitrary file creation and overwrite. This issue was addressed in releases 3.2.3, 4.4.15, 5.0.7 and 6.1.2.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2021-32803 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2021-32803 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-32803.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2021-32803", }, { cve: "CVE-2021-32804", cwe: { id: "CWE-22", name: "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", }, notes: [ { category: "summary", text: "The npm package \"tar\" (aka node-tar) before versions 6.1.1, 5.0.6, 4.4.14, and 3.3.2 has a arbitrary File Creation/Overwrite vulnerability due to insufficient absolute path sanitization. node-tar aims to prevent extraction of absolute file paths by turning absolute paths into relative paths when the preservePaths flag is not set to true. This is achieved by stripping the absolute path root from any absolute file paths contained in a tar file. For example /home/user/.bashrc would turn into home/user/.bashrc. This logic was insufficient when file paths contained repeated path roots such as ////home/user/.bashrc. node-tar would only strip a single path root from such paths. When given an absolute file path with repeating path roots, the resulting path (e.g. ///home/user/.bashrc) would still resolve to an absolute path, thus allowing arbitrary file creation and overwrite. This issue was addressed in releases 3.2.2, 4.4.14, 5.0.6 and 6.1.1. Users may work around this vulnerability without upgrading by creating a custom onentry method which sanitizes the entry.path or a filter method which removes entries with absolute paths. See referenced GitHub Advisory for details. Be aware of CVE-2021-32803 which fixes a similar bug in later versions of tar.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2021-32804 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2021-32804 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-32804.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2021-32804", }, { cve: "CVE-2021-37701", cwe: { id: "CWE-59", name: "Improper Link Resolution Before File Access ('Link Following')", }, notes: [ { category: "summary", text: "The npm package \"tar\" (aka node-tar) before versions 4.4.16, 5.0.8, and 6.1.7 has an arbitrary file creation/overwrite and arbitrary code execution vulnerability. node-tar aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary stat calls to determine whether a given path is a directory, paths are cached when directories are created. This logic was insufficient when extracting tar files that contained both a directory and a symlink with the same name as the directory, where the symlink and directory names in the archive entry used backslashes as a path separator on posix systems. The cache checking logic used both \\ and / characters as path separators, however \\ is a valid filename character on posix systems. By first creating a directory, and then replacing that directory with a symlink, it was thus possible to bypass node-tar symlink checks on directories, essentially allowing an untrusted tar file to symlink into an arbitrary location and subsequently extracting arbitrary files into that location, thus allowing arbitrary file creation and overwrite. Additionally, a similar confusion could arise on case-insensitive filesystems. If a tar archive contained a directory at FOO, followed by a symbolic link named foo, then on case-insensitive file systems, the creation of the symbolic link would remove the directory from the filesystem, but _not_ from the internal directory cache, as it would not be treated as a cache hit. A subsequent file entry within the FOO directory would then be placed in the target of the symbolic link, thinking that the directory had already been created. These issues were addressed in releases 4.4.16, 5.0.8 and 6.1.7. The v3 branch of node-tar has been deprecated and did not receive patches for these issues. If you are still using a v3 release we recommend you update to a more recent version of node-tar. If this is not possible, a workaround is available in the referenced GHSA-9r2w-394v-53qc.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2021-37701 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2021-37701 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-37701.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 8.6, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2021-37701", }, { cve: "CVE-2021-37712", cwe: { id: "CWE-59", name: "Improper Link Resolution Before File Access ('Link Following')", }, notes: [ { category: "summary", text: "The npm package \"tar\" (aka node-tar) before versions 4.4.18, 5.0.10, and 6.1.9 has an arbitrary file creation/overwrite and arbitrary code execution vulnerability. node-tar aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary stat calls to determine whether a given path is a directory, paths are cached when directories are created. This logic was insufficient when extracting tar files that contained both a directory and a symlink with names containing unicode values that normalized to the same value. Additionally, on Windows systems, long path portions would resolve to the same file system entities as their 8.3 \"short path\" counterparts. A specially crafted tar archive could thus include a directory with one form of the path, followed by a symbolic link with a different string that resolves to the same file system entity, followed by a file using the first form. By first creating a directory, and then replacing that directory with a symlink that had a different apparent name that resolved to the same entry in the filesystem, it was thus possible to bypass node-tar symlink checks on directories, essentially allowing an untrusted tar file to symlink into an arbitrary location and subsequently extracting arbitrary files into that location, thus allowing arbitrary file creation and overwrite. These issues were addressed in releases 4.4.18, 5.0.10 and 6.1.9. The v3 branch of node-tar has been deprecated and did not receive patches for these issues. If you are still using a v3 release we recommend you update to a more recent version of node-tar. If this is not possible, a workaround is available in the referenced GHSA-qq89-hq3f-393p.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2021-37712 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2021-37712 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-37712.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 8.6, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2021-37712", }, { cve: "CVE-2021-37713", cwe: { id: "CWE-22", name: "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", }, notes: [ { category: "summary", text: "The npm package \"tar\" (aka node-tar) before versions 4.4.18, 5.0.10, and 6.1.9 has an arbitrary file creation/overwrite and arbitrary code execution vulnerability. node-tar aims to guarantee that any file whose location would be outside of the extraction target directory is not extracted. This is, in part, accomplished by sanitizing absolute paths of entries within the archive, skipping archive entries that contain .. path portions, and resolving the sanitized paths against the extraction target directory. This logic was insufficient on Windows systems when extracting tar files that contained a path that was not an absolute path, but specified a drive letter different from the extraction target, such as C:some\\path. If the drive letter does not match the extraction target, for example D:\\extraction\\dir, then the result of path.resolve(extractionDirectory, entryPath) would resolve against the current working directory on the C: drive, rather than the extraction target directory. Additionally, a .. portion of the path could occur immediately after the drive letter, such as C:../foo, and was not properly sanitized by the logic that checked for .. within the normalized and split portions of the path. This only affects users of node-tar on Windows systems. These issues were addressed in releases 4.4.18, 5.0.10 and 6.1.9. The v3 branch of node-tar has been deprecated and did not receive patches for these issues. If you are still using a v3 release we recommend you update to a more recent version of node-tar. There is no reasonable way to work around this issue without performing the same path normalization procedures that node-tar now does. Users are encouraged to upgrade to the latest patched versions of node-tar, rather than attempt to sanitize paths themselves.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2021-37713 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2021-37713 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-37713.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 8.6, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2021-37713", }, { cve: "CVE-2021-39134", cwe: { id: "CWE-61", name: "UNIX Symbolic Link (Symlink) Following", }, notes: [ { category: "summary", text: "@npmcli/arborist, the library that calculates dependency trees and manages the node_modules folder hierarchy for the npm command line interface, aims to guarantee that package dependency contracts will be met, and the extraction of package contents will always be performed into the expected folder. This is, in part, accomplished by resolving dependency specifiers defined in package.json manifests for dependencies with a specific name, and nesting folders to resolve conflicting dependencies. When multiple dependencies differ only in the case of their name, Arborist's internal data structure saw them as separate items that could coexist within the same level in the node_modules hierarchy. However, on case-insensitive file systems (such as macOS and Windows), this is not the case. Combined with a symlink dependency such as file:/some/path, this allowed an attacker to create a situation in which arbitrary contents could be written to any location on the filesystem. For example, a package pwn-a could define a dependency in their package.json file such as \"foo\": \"file:/some/path\". Another package, pwn-b could define a dependency such as FOO: \"file:foo.tgz\". On case-insensitive file systems, if pwn-a was installed, and then pwn-b was installed afterwards, the contents of foo.tgz would be written to /some/path, and any existing contents of /some/path would be removed. Anyone using npm v7.20.6 or earlier on a case-insensitive filesystem is potentially affected. This is patched in @npmcli/arborist 2.8.2 which is included in npm v7.20.7 and above.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2021-39134 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2021-39134 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-39134.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2021-39134", }, { cve: "CVE-2021-39135", cwe: { id: "CWE-61", name: "UNIX Symbolic Link (Symlink) Following", }, notes: [ { category: "summary", text: "@npmcli/arborist, the library that calculates dependency trees and manages the node_modules folder hierarchy for the npm command line interface, aims to guarantee that package dependency contracts will be met, and the extraction of package contents will always be performed into the expected folder. This is accomplished by extracting package contents into a project's node_modules folder. If the node_modules folder of the root project or any of its dependencies is somehow replaced with a symbolic link, it could allow Arborist to write package dependencies to any arbitrary location on the file system. Note that symbolic links contained within package artifact contents are filtered out, so another means of creating a node_modules symbolic link would have to be employed. 1. A preinstall script could replace node_modules with a symlink. (This is prevented by using --ignore-scripts.) 2. An attacker could supply the target with a git repository, instructing them to run npm install --ignore-scripts in the root. This may be successful, because npm install --ignore-scripts is typically not capable of making changes outside of the project directory, so it may be deemed safe. This is patched in @npmcli/arborist 2.8.2 which is included in npm v7.20.7 and above. For more information including workarounds please see the referenced GHSA-gmw6-94gg-2rc2.", title: "Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { summary: "CVE-2021-39135 - SINEC INS", url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, { summary: "CVE-2021-39135 Mitre 5.0 json", url: "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-39135.json", }, ], remediations: [ { category: "vendor_fix", details: "Update to V1.0.1.1 or later version", product_ids: [ "CSAFPID-0001", ], url: "https://support.industry.siemens.com/cs/ww/en/view/109806100/", }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], title: "CVE-2021-39135", }, ], }
gsd-2021-25216
Vulnerability from gsd
{ GSD: { alias: "CVE-2021-25216", description: "In BIND 9.5.0 -> 9.11.29, 9.12.0 -> 9.16.13, and versions BIND 9.11.3-S1 -> 9.11.29-S1 and 9.16.8-S1 -> 9.16.13-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -> 9.17.1 of the BIND 9.17 development branch, BIND servers are vulnerable if they are running an affected version and are configured to use GSS-TSIG features. In a configuration which uses BIND's default settings the vulnerable code path is not exposed, but a server can be rendered vulnerable by explicitly setting values for the tkey-gssapi-keytab or tkey-gssapi-credential configuration options. Although the default configuration is not vulnerable, GSS-TSIG is frequently used in networks where BIND is integrated with Samba, as well as in mixed-server environments that combine BIND servers with Active Directory domain controllers. For servers that meet these conditions, the ISC SPNEGO implementation is vulnerable to various attacks, depending on the CPU architecture for which BIND was built: For named binaries compiled for 64-bit platforms, this flaw can be used to trigger a buffer over-read, leading to a server crash. For named binaries compiled for 32-bit platforms, this flaw can be used to trigger a server crash due to a buffer overflow and possibly also to achieve remote code execution. We have determined that standard SPNEGO implementations are available in the MIT and Heimdal Kerberos libraries, which support a broad range of operating systems, rendering the ISC implementation unnecessary and obsolete. Therefore, to reduce the attack surface for BIND users, we will be removing the ISC SPNEGO implementation in the April releases of BIND 9.11 and 9.16 (it had already been dropped from BIND 9.17). We would not normally remove something from a stable ESV (Extended Support Version) of BIND, but since system libraries can replace the ISC SPNEGO implementation, we have made an exception in this case for reasons of stability and security.", id: "GSD-2021-25216", references: [ "https://www.suse.com/security/cve/CVE-2021-25216.html", "https://www.debian.org/security/2021/dsa-4909", "https://ubuntu.com/security/CVE-2021-25216", "https://advisories.mageia.org/CVE-2021-25216.html", "https://security.archlinux.org/CVE-2021-25216", ], }, gsd: { metadata: { exploitCode: "unknown", remediation: "unknown", reportConfidence: "confirmed", type: "vulnerability", }, osvSchema: { aliases: [ "CVE-2021-25216", ], details: "In BIND 9.5.0 -> 9.11.29, 9.12.0 -> 9.16.13, and versions BIND 9.11.3-S1 -> 9.11.29-S1 and 9.16.8-S1 -> 9.16.13-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -> 9.17.1 of the BIND 9.17 development branch, BIND servers are vulnerable if they are running an affected version and are configured to use GSS-TSIG features. In a configuration which uses BIND's default settings the vulnerable code path is not exposed, but a server can be rendered vulnerable by explicitly setting values for the tkey-gssapi-keytab or tkey-gssapi-credential configuration options. Although the default configuration is not vulnerable, GSS-TSIG is frequently used in networks where BIND is integrated with Samba, as well as in mixed-server environments that combine BIND servers with Active Directory domain controllers. For servers that meet these conditions, the ISC SPNEGO implementation is vulnerable to various attacks, depending on the CPU architecture for which BIND was built: For named binaries compiled for 64-bit platforms, this flaw can be used to trigger a buffer over-read, leading to a server crash. For named binaries compiled for 32-bit platforms, this flaw can be used to trigger a server crash due to a buffer overflow and possibly also to achieve remote code execution. We have determined that standard SPNEGO implementations are available in the MIT and Heimdal Kerberos libraries, which support a broad range of operating systems, rendering the ISC implementation unnecessary and obsolete. Therefore, to reduce the attack surface for BIND users, we will be removing the ISC SPNEGO implementation in the April releases of BIND 9.11 and 9.16 (it had already been dropped from BIND 9.17). We would not normally remove something from a stable ESV (Extended Support Version) of BIND, but since system libraries can replace the ISC SPNEGO implementation, we have made an exception in this case for reasons of stability and security.", id: "GSD-2021-25216", modified: "2023-12-13T01:23:21.179187Z", schema_version: "1.4.0", }, }, namespaces: { "cve.org": { CVE_data_meta: { ASSIGNER: "security-officer@isc.org", DATE_PUBLIC: "2021-04-28T20:20:10.000Z", ID: "CVE-2021-25216", STATE: "PUBLIC", TITLE: "A second vulnerability in BIND's GSSAPI security policy negotiation can be targeted by a buffer overflow attack", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "BIND9", version: { version_data: [ { version_name: "Open Source Branches 9.5 though 9.11", version_value: "9.5.0 through versions before 9.11.31", }, { version_name: "Open Source Branches 9.12 though 9.16", version_value: "9.12.0 through versions before 9.16.14", }, { version_name: "Supported Preview Branch 9.11-S", version_value: "9.11.3-S1 through versions before 9.11.31-S1", }, { version_name: "Supported Preview Branch 9.16-S", version_value: "9.16.8-S1 through versions before 9.16.14-S1", }, { version_name: "Development Branch 9.17", version_value: "9.17.0 through versions before 9.17.2", }, ], }, }, ], }, vendor_name: "ISC", }, ], }, }, credit: [ { lang: "eng", value: " ISC would like to thank an anonymous party, working in conjunction with Trend Micro Zero Day Initiative, for reporting this issue to us.", }, ], data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "In BIND 9.5.0 -> 9.11.29, 9.12.0 -> 9.16.13, and versions BIND 9.11.3-S1 -> 9.11.29-S1 and 9.16.8-S1 -> 9.16.13-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -> 9.17.1 of the BIND 9.17 development branch, BIND servers are vulnerable if they are running an affected version and are configured to use GSS-TSIG features. In a configuration which uses BIND's default settings the vulnerable code path is not exposed, but a server can be rendered vulnerable by explicitly setting values for the tkey-gssapi-keytab or tkey-gssapi-credential configuration options. Although the default configuration is not vulnerable, GSS-TSIG is frequently used in networks where BIND is integrated with Samba, as well as in mixed-server environments that combine BIND servers with Active Directory domain controllers. For servers that meet these conditions, the ISC SPNEGO implementation is vulnerable to various attacks, depending on the CPU architecture for which BIND was built: For named binaries compiled for 64-bit platforms, this flaw can be used to trigger a buffer over-read, leading to a server crash. For named binaries compiled for 32-bit platforms, this flaw can be used to trigger a server crash due to a buffer overflow and possibly also to achieve remote code execution. We have determined that standard SPNEGO implementations are available in the MIT and Heimdal Kerberos libraries, which support a broad range of operating systems, rendering the ISC implementation unnecessary and obsolete. Therefore, to reduce the attack surface for BIND users, we will be removing the ISC SPNEGO implementation in the April releases of BIND 9.11 and 9.16 (it had already been dropped from BIND 9.17). We would not normally remove something from a stable ESV (Extended Support Version) of BIND, but since system libraries can replace the ISC SPNEGO implementation, we have made an exception in this case for reasons of stability and security.", }, ], }, exploit: [ { lang: "eng", value: "We are not aware of any active exploits.", }, ], generator: { engine: "Vulnogram 0.0.9", }, impact: { cvss: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "GSS-TSIG is an extension to the TSIG protocol which is intended to support the secure exchange of keys for use in verifying the authenticity of communications between parties on a network. SPNEGO is a negotiation mechanism used by GSSAPI, the application protocol interface for GSS-TSIG. The SPNEGO implementation used by BIND has been found to be vulnerable to a buffer overflow attack. Affects BIND 9.5.0 -> 9.11.29, 9.12.0 -> 9.16.13, and versions BIND 9.11.3-S1 -> 9.11.29-S1 and 9.16.8-S1 -> 9.16.13-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -> 9.17.1 of the BIND 9.17 development branch.", }, ], }, ], }, references: { reference_data: [ { name: "https://kb.isc.org/v1/docs/cve-2021-25215", refsource: "CONFIRM", url: "https://kb.isc.org/v1/docs/cve-2021-25215", }, { name: "[oss-security] 20210428 ISC discloses three BIND vulnerabilities (CVE-2021-25214, CVE-2021-25215, and CVE-2021-25216)", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2021/04/29/1", }, { name: "[oss-security] 20210429 Re: ISC discloses three BIND vulnerabilities (CVE-2021-25214, CVE-2021-25215, and CVE-2021-25216)", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2021/04/29/2", }, { name: "[oss-security] 20210429 Re: ISC discloses three BIND vulnerabilities (CVE-2021-25214, CVE-2021-25215, and CVE-2021-25216)", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2021/04/29/3", }, { name: "[oss-security] 20210429 Re: ISC discloses three BIND vulnerabilities (CVE-2021-25214, CVE-2021-25215, and CVE-2021-25216)", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2021/04/29/4", }, { name: "DSA-4909", refsource: "DEBIAN", url: "https://www.debian.org/security/2021/dsa-4909", }, { name: "[debian-lts-announce] 20210504 [SECURITY] [DLA 2647-1] bind9 security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2021/05/msg00001.html", }, { name: "https://security.netapp.com/advisory/ntap-20210521-0006/", refsource: "CONFIRM", url: "https://security.netapp.com/advisory/ntap-20210521-0006/", }, { name: "https://www.zerodayinitiative.com/advisories/ZDI-21-657/", refsource: "MISC", url: "https://www.zerodayinitiative.com/advisories/ZDI-21-657/", }, { name: "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf", refsource: "CONFIRM", url: "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf", }, ], }, solution: [ { lang: "eng", value: "Upgrade to the patched release most closely related to your current version of BIND:\n\n BIND 9.11.31\n BIND 9.16.15\n BIND 9.17.12\n\nBIND Supported Preview Edition is a special feature preview branch of BIND provided to eligible ISC support customers.\n\n BIND 9.11.31-S1\n BIND 9.16.15-S1", }, ], source: { discovery: "EXTERNAL", }, work_around: [ { lang: "eng", value: "This vulnerability only affects servers configured to use GSS-TSIG, most often to sign dynamic updates. If another mechanism can be used to authenticate updates, the vulnerability can be avoided by choosing not to enable the use of GSS-TSIG features.\n\nPrior to the April 2021 BIND releases, on some platforms it was possible to build a working BIND installation that was not vulnerable to CVE-2021-25216 by providing the --disable-isc-spnego command-line argument when running the ./configure script in the top level of the BIND source directory, before compiling and linking named.\n\nAfter the April 2021 BIND releases, all supported branches have removed isc-spnego support. This corrects CVE-2021-25216, but requires that the system have other libraries and header files to support GSS-TSIG functionality, unless such functionality is completely disabled at build time by providing the --without-gssapi argument to the ./configurescript when selecting build options.", }, ], }, "nvd.nist.gov": { configurations: { CVE_data_version: "4.0", nodes: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:isc:bind:*:*:*:*:-:*:*:*", cpe_name: [], versionEndExcluding: "9.11.31", versionStartIncluding: "9.0.0", vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:isc:bind:9.9.3:s1:*:*:supported_preview:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:isc:bind:9.9.12:s1:*:*:supported_preview:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:isc:bind:9.9.13:s1:*:*:supported_preview:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:isc:bind:9.10.5:s1:*:*:supported_preview:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:isc:bind:9.10.7:s1:*:*:supported_preview:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:isc:bind:9.11.3:s1:*:*:supported_preview:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:isc:bind:9.11.5:s3:*:*:supported_preview:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:isc:bind:9.11.5:s5:*:*:supported_preview:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:isc:bind:9.11.5:s6:*:*:supported_preview:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:isc:bind:9.11.6:s1:*:*:supported_preview:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:isc:bind:9.11.7:s1:*:*:supported_preview:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:isc:bind:9.11.8:s1:*:*:supported_preview:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:isc:bind:9.11.12:s1:*:*:supported_preview:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:isc:bind:9.11.21:s1:*:*:supported_preview:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:isc:bind:9.11.27:s1:*:*:supported_preview:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:isc:bind:9.11.29:s1:*:*:supported_preview:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:isc:bind:*:*:*:*:-:*:*:*", cpe_name: [], versionEndExcluding: "9.16.15", versionStartIncluding: "9.12.0", vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:isc:bind:9.16.8:s1:*:*:supported_preview:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:isc:bind:9.16.11:s1:*:*:supported_preview:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:isc:bind:9.16.13:s1:*:*:supported_preview:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:isc:bind:*:*:*:*:-:*:*:*", cpe_name: [], versionEndExcluding: "9.17.12", versionStartIncluding: "9.17.0", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:siemens:sinec_infrastructure_network_services:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.1.1", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vsphere:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netapp:aff_a250_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netapp:aff_a250:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netapp:aff_500f_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netapp:aff_500f:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netapp:h300e_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netapp:h300e:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netapp:h500e_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netapp:h500e:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netapp:h700e_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netapp:h700e:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, ], }, cve: { CVE_data_meta: { ASSIGNER: "security-officer@isc.org", ID: "CVE-2021-25216", }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "en", value: "In BIND 9.5.0 -> 9.11.29, 9.12.0 -> 9.16.13, and versions BIND 9.11.3-S1 -> 9.11.29-S1 and 9.16.8-S1 -> 9.16.13-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -> 9.17.1 of the BIND 9.17 development branch, BIND servers are vulnerable if they are running an affected version and are configured to use GSS-TSIG features. In a configuration which uses BIND's default settings the vulnerable code path is not exposed, but a server can be rendered vulnerable by explicitly setting values for the tkey-gssapi-keytab or tkey-gssapi-credential configuration options. Although the default configuration is not vulnerable, GSS-TSIG is frequently used in networks where BIND is integrated with Samba, as well as in mixed-server environments that combine BIND servers with Active Directory domain controllers. For servers that meet these conditions, the ISC SPNEGO implementation is vulnerable to various attacks, depending on the CPU architecture for which BIND was built: For named binaries compiled for 64-bit platforms, this flaw can be used to trigger a buffer over-read, leading to a server crash. For named binaries compiled for 32-bit platforms, this flaw can be used to trigger a server crash due to a buffer overflow and possibly also to achieve remote code execution. We have determined that standard SPNEGO implementations are available in the MIT and Heimdal Kerberos libraries, which support a broad range of operating systems, rendering the ISC implementation unnecessary and obsolete. Therefore, to reduce the attack surface for BIND users, we will be removing the ISC SPNEGO implementation in the April releases of BIND 9.11 and 9.16 (it had already been dropped from BIND 9.17). We would not normally remove something from a stable ESV (Extended Support Version) of BIND, but since system libraries can replace the ISC SPNEGO implementation, we have made an exception in this case for reasons of stability and security.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "en", value: "CWE-190", }, ], }, ], }, references: { reference_data: [ { name: "https://kb.isc.org/v1/docs/cve-2021-25215", refsource: "CONFIRM", tags: [ "Not Applicable", ], url: "https://kb.isc.org/v1/docs/cve-2021-25215", }, { name: "[oss-security] 20210428 ISC discloses three BIND vulnerabilities (CVE-2021-25214, CVE-2021-25215, and CVE-2021-25216)", refsource: "MLIST", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://www.openwall.com/lists/oss-security/2021/04/29/1", }, { name: "[oss-security] 20210429 Re: ISC discloses three BIND vulnerabilities (CVE-2021-25214, CVE-2021-25215, and CVE-2021-25216)", refsource: "MLIST", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://www.openwall.com/lists/oss-security/2021/04/29/2", }, { name: "[oss-security] 20210429 Re: ISC discloses three BIND vulnerabilities (CVE-2021-25214, CVE-2021-25215, and CVE-2021-25216)", refsource: "MLIST", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://www.openwall.com/lists/oss-security/2021/04/29/3", }, { name: "[oss-security] 20210429 Re: ISC discloses three BIND vulnerabilities (CVE-2021-25214, CVE-2021-25215, and CVE-2021-25216)", refsource: "MLIST", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://www.openwall.com/lists/oss-security/2021/04/29/4", }, { name: "DSA-4909", refsource: "DEBIAN", tags: [ "Third Party Advisory", ], url: "https://www.debian.org/security/2021/dsa-4909", }, { name: "[debian-lts-announce] 20210504 [SECURITY] [DLA 2647-1] bind9 security update", refsource: "MLIST", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2021/05/msg00001.html", }, { name: "https://security.netapp.com/advisory/ntap-20210521-0006/", refsource: "CONFIRM", tags: [ "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20210521-0006/", }, { name: "https://www.zerodayinitiative.com/advisories/ZDI-21-657/", refsource: "MISC", tags: [ "Third Party Advisory", "VDB Entry", ], url: "https://www.zerodayinitiative.com/advisories/ZDI-21-657/", }, { name: "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf", refsource: "CONFIRM", tags: [ "Patch", "Third Party Advisory", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf", }, ], }, }, impact: { baseMetricV2: { acInsufInfo: false, cvssV2: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 6.8, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "MEDIUM", userInteractionRequired: false, }, baseMetricV3: { cvssV3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 5.9, }, }, lastModifiedDate: "2022-04-25T20:02Z", publishedDate: "2021-04-29T01:15Z", }, }, }
ghsa-4vh7-r4m9-4w3v
Vulnerability from github
In BIND 9.5.0 -> 9.11.29, 9.12.0 -> 9.16.13, and versions BIND 9.11.3-S1 -> 9.11.29-S1 and 9.16.8-S1 -> 9.16.13-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -> 9.17.1 of the BIND 9.17 development branch, BIND servers are vulnerable if they are running an affected version and are configured to use GSS-TSIG features. In a configuration which uses BIND's default settings the vulnerable code path is not exposed, but a server can be rendered vulnerable by explicitly setting values for the tkey-gssapi-keytab or tkey-gssapi-credential configuration options. Although the default configuration is not vulnerable, GSS-TSIG is frequently used in networks where BIND is integrated with Samba, as well as in mixed-server environments that combine BIND servers with Active Directory domain controllers. For servers that meet these conditions, the ISC SPNEGO implementation is vulnerable to various attacks, depending on the CPU architecture for which BIND was built: For named binaries compiled for 64-bit platforms, this flaw can be used to trigger a buffer over-read, leading to a server crash. For named binaries compiled for 32-bit platforms, this flaw can be used to trigger a server crash due to a buffer overflow and possibly also to achieve remote code execution. We have determined that standard SPNEGO implementations are available in the MIT and Heimdal Kerberos libraries, which support a broad range of operating systems, rendering the ISC implementation unnecessary and obsolete. Therefore, to reduce the attack surface for BIND users, we will be removing the ISC SPNEGO implementation in the April releases of BIND 9.11 and 9.16 (it had already been dropped from BIND 9.17). We would not normally remove something from a stable ESV (Extended Support Version) of BIND, but since system libraries can replace the ISC SPNEGO implementation, we have made an exception in this case for reasons of stability and security.
{ affected: [], aliases: [ "CVE-2021-25216", ], database_specific: { cwe_ids: [ "CWE-125", "CWE-190", "CWE-617", ], github_reviewed: false, github_reviewed_at: null, nvd_published_at: "2021-04-29T01:15:00Z", severity: "CRITICAL", }, details: "In BIND 9.5.0 -> 9.11.29, 9.12.0 -> 9.16.13, and versions BIND 9.11.3-S1 -> 9.11.29-S1 and 9.16.8-S1 -> 9.16.13-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -> 9.17.1 of the BIND 9.17 development branch, BIND servers are vulnerable if they are running an affected version and are configured to use GSS-TSIG features. In a configuration which uses BIND's default settings the vulnerable code path is not exposed, but a server can be rendered vulnerable by explicitly setting values for the tkey-gssapi-keytab or tkey-gssapi-credential configuration options. Although the default configuration is not vulnerable, GSS-TSIG is frequently used in networks where BIND is integrated with Samba, as well as in mixed-server environments that combine BIND servers with Active Directory domain controllers. For servers that meet these conditions, the ISC SPNEGO implementation is vulnerable to various attacks, depending on the CPU architecture for which BIND was built: For named binaries compiled for 64-bit platforms, this flaw can be used to trigger a buffer over-read, leading to a server crash. For named binaries compiled for 32-bit platforms, this flaw can be used to trigger a server crash due to a buffer overflow and possibly also to achieve remote code execution. We have determined that standard SPNEGO implementations are available in the MIT and Heimdal Kerberos libraries, which support a broad range of operating systems, rendering the ISC implementation unnecessary and obsolete. Therefore, to reduce the attack surface for BIND users, we will be removing the ISC SPNEGO implementation in the April releases of BIND 9.11 and 9.16 (it had already been dropped from BIND 9.17). We would not normally remove something from a stable ESV (Extended Support Version) of BIND, but since system libraries can replace the ISC SPNEGO implementation, we have made an exception in this case for reasons of stability and security.", id: "GHSA-4vh7-r4m9-4w3v", modified: "2022-05-24T17:49:12Z", published: "2022-05-24T17:49:12Z", references: [ { type: "ADVISORY", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-25216", }, { type: "WEB", url: "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf", }, { type: "WEB", url: "https://kb.isc.org/v1/docs/cve-2021-25215", }, { type: "WEB", url: "https://lists.debian.org/debian-lts-announce/2021/05/msg00001.html", }, { type: "WEB", url: "https://security.netapp.com/advisory/ntap-20210521-0006", }, { type: "WEB", url: "https://www.debian.org/security/2021/dsa-4909", }, { type: "WEB", url: "https://www.zerodayinitiative.com/advisories/ZDI-21-657", }, { type: "WEB", url: "http://www.openwall.com/lists/oss-security/2021/04/29/1", }, { type: "WEB", url: "http://www.openwall.com/lists/oss-security/2021/04/29/2", }, { type: "WEB", url: "http://www.openwall.com/lists/oss-security/2021/04/29/3", }, { type: "WEB", url: "http://www.openwall.com/lists/oss-security/2021/04/29/4", }, ], schema_version: "1.4.0", severity: [ { score: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", type: "CVSS_V3", }, ], }
opensuse-su-2024:10650-1
Vulnerability from csaf_opensuse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "bind-9.16.20-1.4 on GA media", title: "Title of the patch", }, { category: "description", text: "These are all security issues fixed in the bind-9.16.20-1.4 package on the GA media of openSUSE Tumbleweed.", title: "Description of the patch", }, { category: "details", text: "openSUSE-Tumbleweed-2024-10650", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10650-1.json", }, { category: "self", summary: "SUSE CVE CVE-2006-4339 page", url: "https://www.suse.com/security/cve/CVE-2006-4339/", }, { category: "self", summary: "SUSE CVE CVE-2007-2925 page", url: "https://www.suse.com/security/cve/CVE-2007-2925/", }, { category: "self", summary: "SUSE CVE CVE-2007-2926 page", url: "https://www.suse.com/security/cve/CVE-2007-2926/", }, { category: "self", summary: "SUSE CVE CVE-2015-8461 page", url: "https://www.suse.com/security/cve/CVE-2015-8461/", }, { category: "self", summary: "SUSE CVE CVE-2016-2775 page", url: "https://www.suse.com/security/cve/CVE-2016-2775/", }, { category: "self", summary: "SUSE CVE CVE-2016-9131 page", url: "https://www.suse.com/security/cve/CVE-2016-9131/", }, { category: "self", summary: "SUSE CVE CVE-2016-9778 page", url: "https://www.suse.com/security/cve/CVE-2016-9778/", }, { category: "self", summary: "SUSE CVE CVE-2017-3135 page", url: "https://www.suse.com/security/cve/CVE-2017-3135/", }, { category: "self", summary: "SUSE CVE CVE-2017-3141 page", url: "https://www.suse.com/security/cve/CVE-2017-3141/", }, { category: "self", summary: "SUSE CVE CVE-2017-3142 page", url: "https://www.suse.com/security/cve/CVE-2017-3142/", }, { category: "self", summary: "SUSE CVE CVE-2017-3145 page", url: "https://www.suse.com/security/cve/CVE-2017-3145/", }, { category: "self", summary: "SUSE CVE CVE-2018-5737 page", url: "https://www.suse.com/security/cve/CVE-2018-5737/", }, { category: "self", summary: "SUSE CVE CVE-2018-5743 page", url: "https://www.suse.com/security/cve/CVE-2018-5743/", }, { category: "self", summary: "SUSE CVE CVE-2018-5745 page", url: "https://www.suse.com/security/cve/CVE-2018-5745/", }, { category: "self", summary: "SUSE CVE CVE-2019-6465 page", url: "https://www.suse.com/security/cve/CVE-2019-6465/", }, { category: "self", summary: "SUSE CVE CVE-2019-6471 page", url: "https://www.suse.com/security/cve/CVE-2019-6471/", }, { category: "self", summary: "SUSE CVE CVE-2019-6476 page", url: "https://www.suse.com/security/cve/CVE-2019-6476/", }, { category: "self", summary: "SUSE CVE CVE-2019-6477 page", url: "https://www.suse.com/security/cve/CVE-2019-6477/", }, { category: "self", summary: "SUSE CVE CVE-2020-8616 page", url: "https://www.suse.com/security/cve/CVE-2020-8616/", }, { category: "self", summary: "SUSE CVE CVE-2020-8617 page", url: "https://www.suse.com/security/cve/CVE-2020-8617/", }, { category: "self", summary: "SUSE CVE CVE-2020-8618 page", url: "https://www.suse.com/security/cve/CVE-2020-8618/", }, { category: "self", summary: "SUSE CVE CVE-2020-8619 page", url: "https://www.suse.com/security/cve/CVE-2020-8619/", }, { category: "self", summary: "SUSE CVE CVE-2020-8620 page", url: "https://www.suse.com/security/cve/CVE-2020-8620/", }, { category: "self", summary: "SUSE CVE CVE-2020-8621 page", url: "https://www.suse.com/security/cve/CVE-2020-8621/", }, { category: "self", summary: "SUSE CVE CVE-2020-8622 page", url: "https://www.suse.com/security/cve/CVE-2020-8622/", }, { category: "self", summary: "SUSE CVE CVE-2020-8623 page", url: "https://www.suse.com/security/cve/CVE-2020-8623/", }, { category: "self", summary: "SUSE CVE CVE-2020-8624 page", url: "https://www.suse.com/security/cve/CVE-2020-8624/", }, { category: "self", summary: "SUSE CVE CVE-2020-8625 page", url: "https://www.suse.com/security/cve/CVE-2020-8625/", }, { category: "self", summary: "SUSE CVE CVE-2021-25214 page", url: "https://www.suse.com/security/cve/CVE-2021-25214/", }, { category: "self", summary: "SUSE CVE CVE-2021-25215 page", url: "https://www.suse.com/security/cve/CVE-2021-25215/", }, { category: "self", summary: "SUSE CVE CVE-2021-25216 page", url: "https://www.suse.com/security/cve/CVE-2021-25216/", }, { category: "self", summary: "SUSE CVE CVE-2021-25218 page", url: "https://www.suse.com/security/cve/CVE-2021-25218/", }, ], title: "bind-9.16.20-1.4 on GA media", tracking: { current_release_date: "2024-06-15T00:00:00Z", generator: { date: "2024-06-15T00:00:00Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2024:10650-1", initial_release_date: "2024-06-15T00:00:00Z", revision_history: [ { date: "2024-06-15T00:00:00Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "bind-9.16.20-1.4.aarch64", product: { name: "bind-9.16.20-1.4.aarch64", product_id: "bind-9.16.20-1.4.aarch64", }, }, { category: "product_version", name: "bind-doc-9.16.20-1.4.aarch64", product: { name: "bind-doc-9.16.20-1.4.aarch64", product_id: "bind-doc-9.16.20-1.4.aarch64", }, }, { category: "product_version", name: "bind-utils-9.16.20-1.4.aarch64", product: { name: "bind-utils-9.16.20-1.4.aarch64", product_id: "bind-utils-9.16.20-1.4.aarch64", }, }, { category: "product_version", name: "python3-bind-9.16.20-1.4.aarch64", product: { name: "python3-bind-9.16.20-1.4.aarch64", product_id: "python3-bind-9.16.20-1.4.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "bind-9.16.20-1.4.ppc64le", product: { name: "bind-9.16.20-1.4.ppc64le", product_id: "bind-9.16.20-1.4.ppc64le", }, }, { category: "product_version", name: "bind-doc-9.16.20-1.4.ppc64le", product: { name: "bind-doc-9.16.20-1.4.ppc64le", product_id: "bind-doc-9.16.20-1.4.ppc64le", }, }, { category: "product_version", name: "bind-utils-9.16.20-1.4.ppc64le", product: { name: "bind-utils-9.16.20-1.4.ppc64le", product_id: "bind-utils-9.16.20-1.4.ppc64le", }, }, { category: "product_version", name: "python3-bind-9.16.20-1.4.ppc64le", product: { name: "python3-bind-9.16.20-1.4.ppc64le", product_id: "python3-bind-9.16.20-1.4.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "bind-9.16.20-1.4.s390x", product: { name: "bind-9.16.20-1.4.s390x", product_id: "bind-9.16.20-1.4.s390x", }, }, { category: "product_version", name: "bind-doc-9.16.20-1.4.s390x", product: { name: "bind-doc-9.16.20-1.4.s390x", product_id: "bind-doc-9.16.20-1.4.s390x", }, }, { category: "product_version", name: "bind-utils-9.16.20-1.4.s390x", product: { name: "bind-utils-9.16.20-1.4.s390x", product_id: "bind-utils-9.16.20-1.4.s390x", }, }, { category: "product_version", name: "python3-bind-9.16.20-1.4.s390x", product: { name: "python3-bind-9.16.20-1.4.s390x", product_id: "python3-bind-9.16.20-1.4.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "bind-9.16.20-1.4.x86_64", product: { name: "bind-9.16.20-1.4.x86_64", product_id: "bind-9.16.20-1.4.x86_64", }, }, { category: "product_version", name: "bind-doc-9.16.20-1.4.x86_64", product: { name: "bind-doc-9.16.20-1.4.x86_64", product_id: "bind-doc-9.16.20-1.4.x86_64", }, }, { category: "product_version", name: "bind-utils-9.16.20-1.4.x86_64", product: { name: "bind-utils-9.16.20-1.4.x86_64", product_id: "bind-utils-9.16.20-1.4.x86_64", }, }, { category: "product_version", name: "python3-bind-9.16.20-1.4.x86_64", product: { name: "python3-bind-9.16.20-1.4.x86_64", product_id: "python3-bind-9.16.20-1.4.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "openSUSE Tumbleweed", product: { name: "openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed", product_identification_helper: { cpe: "cpe:/o:opensuse:tumbleweed", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "bind-9.16.20-1.4.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:bind-9.16.20-1.4.aarch64", }, product_reference: "bind-9.16.20-1.4.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "bind-9.16.20-1.4.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:bind-9.16.20-1.4.ppc64le", }, product_reference: "bind-9.16.20-1.4.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "bind-9.16.20-1.4.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:bind-9.16.20-1.4.s390x", }, product_reference: "bind-9.16.20-1.4.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "bind-9.16.20-1.4.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:bind-9.16.20-1.4.x86_64", }, product_reference: "bind-9.16.20-1.4.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "bind-doc-9.16.20-1.4.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.aarch64", }, product_reference: "bind-doc-9.16.20-1.4.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "bind-doc-9.16.20-1.4.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.ppc64le", }, product_reference: "bind-doc-9.16.20-1.4.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "bind-doc-9.16.20-1.4.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.s390x", }, product_reference: "bind-doc-9.16.20-1.4.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "bind-doc-9.16.20-1.4.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.x86_64", }, product_reference: "bind-doc-9.16.20-1.4.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "bind-utils-9.16.20-1.4.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.aarch64", }, product_reference: "bind-utils-9.16.20-1.4.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "bind-utils-9.16.20-1.4.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.ppc64le", }, product_reference: "bind-utils-9.16.20-1.4.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "bind-utils-9.16.20-1.4.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.s390x", }, product_reference: "bind-utils-9.16.20-1.4.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "bind-utils-9.16.20-1.4.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.x86_64", }, product_reference: "bind-utils-9.16.20-1.4.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python3-bind-9.16.20-1.4.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.aarch64", }, product_reference: "python3-bind-9.16.20-1.4.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python3-bind-9.16.20-1.4.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.ppc64le", }, product_reference: "python3-bind-9.16.20-1.4.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python3-bind-9.16.20-1.4.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.s390x", }, product_reference: "python3-bind-9.16.20-1.4.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "python3-bind-9.16.20-1.4.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.x86_64", }, product_reference: "python3-bind-9.16.20-1.4.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, ], }, vulnerabilities: [ { cve: "CVE-2006-4339", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2006-4339", }, ], notes: [ { category: "general", text: "OpenSSL before 0.9.7, 0.9.7 before 0.9.7k, and 0.9.8 before 0.9.8c, when using an RSA key with exponent 3, removes PKCS-1 padding before generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents OpenSSL from correctly verifying X.509 and other certificates that use PKCS #1.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2006-4339", url: "https://www.suse.com/security/cve/CVE-2006-4339", }, { category: "external", summary: "SUSE Bug 202366 for CVE-2006-4339", url: "https://bugzilla.suse.com/202366", }, { category: "external", summary: "SUSE Bug 203595 for CVE-2006-4339", url: "https://bugzilla.suse.com/203595", }, { category: "external", summary: "SUSE Bug 206636 for CVE-2006-4339", url: "https://bugzilla.suse.com/206636", }, { category: "external", summary: "SUSE Bug 207635 for CVE-2006-4339", url: "https://bugzilla.suse.com/207635", }, { category: "external", summary: "SUSE Bug 215623 for CVE-2006-4339", url: "https://bugzilla.suse.com/215623", }, { category: "external", summary: "SUSE Bug 218303 for CVE-2006-4339", url: "https://bugzilla.suse.com/218303", }, { category: "external", summary: "SUSE Bug 233584 for CVE-2006-4339", url: "https://bugzilla.suse.com/233584", }, { category: "external", summary: "SUSE Bug 564512 for CVE-2006-4339", url: "https://bugzilla.suse.com/564512", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2006-4339", }, { cve: "CVE-2007-2925", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2007-2925", }, ], notes: [ { category: "general", text: "The default access control lists (ACL) in ISC BIND 9.4.0, 9.4.1, and 9.5.0a1 through 9.5.0a5 do not set the allow-recursion and allow-query-cache ACLs, which allows remote attackers to make recursive queries and query the cache.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2007-2925", url: "https://www.suse.com/security/cve/CVE-2007-2925", }, { category: "external", summary: "SUSE Bug 294403 for CVE-2007-2925", url: "https://bugzilla.suse.com/294403", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2007-2925", }, { cve: "CVE-2007-2926", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2007-2926", }, ], notes: [ { category: "general", text: "ISC BIND 9 through 9.5.0a5 uses a weak random number generator during generation of DNS query ids when answering resolver questions or sending NOTIFY messages to slave name servers, which makes it easier for remote attackers to guess the next query id and perform DNS cache poisoning.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2007-2926", url: "https://www.suse.com/security/cve/CVE-2007-2926", }, { category: "external", summary: "SUSE Bug 294403 for CVE-2007-2926", url: "https://bugzilla.suse.com/294403", }, { category: "external", summary: "SUSE Bug 295040 for CVE-2007-2926", url: "https://bugzilla.suse.com/295040", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2007-2926", }, { cve: "CVE-2015-8461", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8461", }, ], notes: [ { category: "general", text: "Race condition in resolver.c in named in ISC BIND 9.9.8 before 9.9.8-P2 and 9.10.3 before 9.10.3-P2 allows remote attackers to cause a denial of service (INSIST assertion failure and daemon exit) via unspecified vectors.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8461", url: "https://www.suse.com/security/cve/CVE-2015-8461", }, { category: "external", summary: "SUSE Bug 958861 for CVE-2015-8461", url: "https://bugzilla.suse.com/958861", }, { category: "external", summary: "SUSE Bug 958862 for CVE-2015-8461", url: "https://bugzilla.suse.com/958862", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2015-8461", }, { cve: "CVE-2016-2775", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2775", }, ], notes: [ { category: "general", text: "ISC BIND 9.x before 9.9.9-P2, 9.10.x before 9.10.4-P2, and 9.11.x before 9.11.0b2, when lwresd or the named lwres option is enabled, allows remote attackers to cause a denial of service (daemon crash) via a long request that uses the lightweight resolver protocol.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2775", url: "https://www.suse.com/security/cve/CVE-2016-2775", }, { category: "external", summary: "SUSE Bug 989528 for CVE-2016-2775", url: "https://bugzilla.suse.com/989528", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2016-2775", }, { cve: "CVE-2016-9131", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-9131", }, ], notes: [ { category: "general", text: "named in ISC BIND 9.x before 9.9.9-P5, 9.10.x before 9.10.4-P5, and 9.11.x before 9.11.0-P2 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a malformed response to an RTYPE ANY query.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-9131", url: "https://www.suse.com/security/cve/CVE-2016-9131", }, { category: "external", summary: "SUSE Bug 1018699 for CVE-2016-9131", url: "https://bugzilla.suse.com/1018699", }, { category: "external", summary: "SUSE Bug 1018700 for CVE-2016-9131", url: "https://bugzilla.suse.com/1018700", }, { category: "external", summary: "SUSE Bug 1018701 for CVE-2016-9131", url: "https://bugzilla.suse.com/1018701", }, { category: "external", summary: "SUSE Bug 1018702 for CVE-2016-9131", url: "https://bugzilla.suse.com/1018702", }, { category: "external", summary: "SUSE Bug 1033466 for CVE-2016-9131", url: "https://bugzilla.suse.com/1033466", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2016-9131", }, { cve: "CVE-2016-9778", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-9778", }, ], notes: [ { category: "general", text: "An error in handling certain queries can cause an assertion failure when a server is using the nxdomain-redirect feature to cover a zone for which it is also providing authoritative service. A vulnerable server could be intentionally stopped by an attacker if it was using a configuration that met the criteria for the vulnerability and if the attacker could cause it to accept a query that possessed the required attributes. Please note: This vulnerability affects the \"nxdomain-redirect\" feature, which is one of two methods of handling NXDOMAIN redirection, and is only available in certain versions of BIND. Redirection using zones of type \"redirect\" is not affected by this vulnerability. Affects BIND 9.9.8-S1 -> 9.9.8-S3, 9.9.9-S1 -> 9.9.9-S6, 9.11.0-9.11.0-P1.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-9778", url: "https://www.suse.com/security/cve/CVE-2016-9778", }, { category: "external", summary: "SUSE Bug 1018699 for CVE-2016-9778", url: "https://bugzilla.suse.com/1018699", }, { category: "external", summary: "SUSE Bug 1018703 for CVE-2016-9778", url: "https://bugzilla.suse.com/1018703", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2016-9778", }, { cve: "CVE-2017-3135", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-3135", }, ], notes: [ { category: "general", text: "Under some conditions when using both DNS64 and RPZ to rewrite query responses, query processing can resume in an inconsistent state leading to either an INSIST assertion failure or an attempt to read through a NULL pointer. Affects BIND 9.8.8, 9.9.3-S1 -> 9.9.9-S7, 9.9.3 -> 9.9.9-P5, 9.9.10b1, 9.10.0 -> 9.10.4-P5, 9.10.5b1, 9.11.0 -> 9.11.0-P2, 9.11.1b1.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-3135", url: "https://www.suse.com/security/cve/CVE-2017-3135", }, { category: "external", summary: "SUSE Bug 1018700 for CVE-2017-3135", url: "https://bugzilla.suse.com/1018700", }, { category: "external", summary: "SUSE Bug 1018701 for CVE-2017-3135", url: "https://bugzilla.suse.com/1018701", }, { category: "external", summary: "SUSE Bug 1018702 for CVE-2017-3135", url: "https://bugzilla.suse.com/1018702", }, { category: "external", summary: "SUSE Bug 1024130 for CVE-2017-3135", url: "https://bugzilla.suse.com/1024130", }, { category: "external", summary: "SUSE Bug 1033466 for CVE-2017-3135", url: "https://bugzilla.suse.com/1033466", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2017-3135", }, { cve: "CVE-2017-3141", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-3141", }, ], notes: [ { category: "general", text: "The BIND installer on Windows uses an unquoted service path which can enable a local user to achieve privilege escalation if the host file system permissions allow this. Affects BIND 9.2.6-P2->9.2.9, 9.3.2-P1->9.3.6, 9.4.0->9.8.8, 9.9.0->9.9.10, 9.10.0->9.10.5, 9.11.0->9.11.1, 9.9.3-S1->9.9.10-S1, 9.10.5-S1.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-3141", url: "https://www.suse.com/security/cve/CVE-2017-3141", }, { category: "external", summary: "SUSE Bug 1044225 for CVE-2017-3141", url: "https://bugzilla.suse.com/1044225", }, { category: "external", summary: "SUSE Bug 1044226 for CVE-2017-3141", url: "https://bugzilla.suse.com/1044226", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-3141", }, { cve: "CVE-2017-3142", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-3142", }, ], notes: [ { category: "general", text: "An attacker who is able to send and receive messages to an authoritative DNS server and who has knowledge of a valid TSIG key name may be able to circumvent TSIG authentication of AXFR requests via a carefully constructed request packet. A server that relies solely on TSIG keys for protection with no other ACL protection could be manipulated into: providing an AXFR of a zone to an unauthorized recipient or accepting bogus NOTIFY packets. Affects BIND 9.4.0->9.8.8, 9.9.0->9.9.10-P1, 9.10.0->9.10.5-P1, 9.11.0->9.11.1-P1, 9.9.3-S1->9.9.10-S2, 9.10.5-S1->9.10.5-S2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-3142", url: "https://www.suse.com/security/cve/CVE-2017-3142", }, { category: "external", summary: "SUSE Bug 1024130 for CVE-2017-3142", url: "https://bugzilla.suse.com/1024130", }, { category: "external", summary: "SUSE Bug 1046554 for CVE-2017-3142", url: "https://bugzilla.suse.com/1046554", }, { category: "external", summary: "SUSE Bug 1046555 for CVE-2017-3142", url: "https://bugzilla.suse.com/1046555", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2017-3142", }, { cve: "CVE-2017-3145", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-3145", }, ], notes: [ { category: "general", text: "BIND was improperly sequencing cleanup operations on upstream recursion fetch contexts, leading in some cases to a use-after-free error that can trigger an assertion failure and crash in named. Affects BIND 9.0.0 to 9.8.x, 9.9.0 to 9.9.11, 9.10.0 to 9.10.6, 9.11.0 to 9.11.2, 9.9.3-S1 to 9.9.11-S1, 9.10.5-S1 to 9.10.6-S1, 9.12.0a1 to 9.12.0rc1.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-3145", url: "https://www.suse.com/security/cve/CVE-2017-3145", }, { category: "external", summary: "SUSE Bug 1076118 for CVE-2017-3145", url: "https://bugzilla.suse.com/1076118", }, { category: "external", summary: "SUSE Bug 1101131 for CVE-2017-3145", url: "https://bugzilla.suse.com/1101131", }, { category: "external", summary: "SUSE Bug 1177790 for CVE-2017-3145", url: "https://bugzilla.suse.com/1177790", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2017-3145", }, { cve: "CVE-2018-5737", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-5737", }, ], notes: [ { category: "general", text: "A problem with the implementation of the new serve-stale feature in BIND 9.12 can lead to an assertion failure in rbtdb.c, even when stale-answer-enable is off. Additionally, problematic interaction between the serve-stale feature and NSEC aggressive negative caching can in some cases cause undesirable behavior from named, such as a recursion loop or excessive logging. Deliberate exploitation of this condition could cause operational problems depending on the particular manifestation -- either degradation or denial of service. Affects BIND 9.12.0 and 9.12.1.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-5737", url: "https://www.suse.com/security/cve/CVE-2018-5737", }, { category: "external", summary: "SUSE Bug 1093448 for CVE-2018-5737", url: "https://bugzilla.suse.com/1093448", }, { category: "external", summary: "SUSE Bug 1093449 for CVE-2018-5737", url: "https://bugzilla.suse.com/1093449", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2018-5737", }, { cve: "CVE-2018-5743", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-5743", }, ], notes: [ { category: "general", text: "By design, BIND is intended to limit the number of TCP clients that can be connected at any given time. The number of allowed connections is a tunable parameter which, if unset, defaults to a conservative value for most servers. Unfortunately, the code which was intended to limit the number of simultaneous connections contained an error which could be exploited to grow the number of simultaneous connections beyond this limit. Versions affected: BIND 9.9.0 -> 9.10.8-P1, 9.11.0 -> 9.11.6, 9.12.0 -> 9.12.4, 9.14.0. BIND 9 Supported Preview Edition versions 9.9.3-S1 -> 9.11.5-S3, and 9.11.5-S5. Versions 9.13.0 -> 9.13.7 of the 9.13 development branch are also affected. Versions prior to BIND 9.9.0 have not been evaluated for vulnerability to CVE-2018-5743.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-5743", url: "https://www.suse.com/security/cve/CVE-2018-5743", }, { category: "external", summary: "SUSE Bug 1133185 for CVE-2018-5743", url: "https://bugzilla.suse.com/1133185", }, { category: "external", summary: "SUSE Bug 1148887 for CVE-2018-5743", url: "https://bugzilla.suse.com/1148887", }, { category: "external", summary: "SUSE Bug 1157051 for CVE-2018-5743", url: "https://bugzilla.suse.com/1157051", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2018-5743", }, { cve: "CVE-2018-5745", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-5745", }, ], notes: [ { category: "general", text: "\"managed-keys\" is a feature which allows a BIND resolver to automatically maintain the keys used by trust anchors which operators configure for use in DNSSEC validation. Due to an error in the managed-keys feature it is possible for a BIND server which uses managed-keys to exit due to an assertion failure if, during key rollover, a trust anchor's keys are replaced with keys which use an unsupported algorithm. Versions affected: BIND 9.9.0 -> 9.10.8-P1, 9.11.0 -> 9.11.5-P1, 9.12.0 -> 9.12.3-P1, and versions 9.9.3-S1 -> 9.11.5-S3 of BIND 9 Supported Preview Edition. Versions 9.13.0 -> 9.13.6 of the 9.13 development branch are also affected. Versions prior to BIND 9.9.0 have not been evaluated for vulnerability to CVE-2018-5745.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-5745", url: "https://www.suse.com/security/cve/CVE-2018-5745", }, { category: "external", summary: "SUSE Bug 1126068 for CVE-2018-5745", url: "https://bugzilla.suse.com/1126068", }, { category: "external", summary: "SUSE Bug 1141730 for CVE-2018-5745", url: "https://bugzilla.suse.com/1141730", }, { category: "external", summary: "SUSE Bug 1148887 for CVE-2018-5745", url: "https://bugzilla.suse.com/1148887", }, { category: "external", summary: "SUSE Bug 1177790 for CVE-2018-5745", url: "https://bugzilla.suse.com/1177790", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-5745", }, { cve: "CVE-2019-6465", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-6465", }, ], notes: [ { category: "general", text: "Controls for zone transfers may not be properly applied to Dynamically Loadable Zones (DLZs) if the zones are writable Versions affected: BIND 9.9.0 -> 9.10.8-P1, 9.11.0 -> 9.11.5-P2, 9.12.0 -> 9.12.3-P2, and versions 9.9.3-S1 -> 9.11.5-S3 of BIND 9 Supported Preview Edition. Versions 9.13.0 -> 9.13.6 of the 9.13 development branch are also affected. Versions prior to BIND 9.9.0 have not been evaluated for vulnerability to CVE-2019-6465.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-6465", url: "https://www.suse.com/security/cve/CVE-2019-6465", }, { category: "external", summary: "SUSE Bug 1126069 for CVE-2019-6465", url: "https://bugzilla.suse.com/1126069", }, { category: "external", summary: "SUSE Bug 1141730 for CVE-2019-6465", url: "https://bugzilla.suse.com/1141730", }, { category: "external", summary: "SUSE Bug 1148887 for CVE-2019-6465", url: "https://bugzilla.suse.com/1148887", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-6465", }, { cve: "CVE-2019-6471", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-6471", }, ], notes: [ { category: "general", text: "A race condition which may occur when discarding malformed packets can result in BIND exiting due to a REQUIRE assertion failure in dispatch.c. Versions affected: BIND 9.11.0 -> 9.11.7, 9.12.0 -> 9.12.4-P1, 9.14.0 -> 9.14.2. Also all releases of the BIND 9.13 development branch and version 9.15.0 of the BIND 9.15 development branch and BIND Supported Preview Edition versions 9.11.3-S1 -> 9.11.7-S1.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-6471", url: "https://www.suse.com/security/cve/CVE-2019-6471", }, { category: "external", summary: "SUSE Bug 1138687 for CVE-2019-6471", url: "https://bugzilla.suse.com/1138687", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-6471", }, { cve: "CVE-2019-6476", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-6476", }, ], notes: [ { category: "general", text: "A defect in code added to support QNAME minimization can cause named to exit with an assertion failure if a forwarder returns a referral rather than resolving the query. This affects BIND versions 9.14.0 up to 9.14.6, and 9.15.0 up to 9.15.4.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-6476", url: "https://www.suse.com/security/cve/CVE-2019-6476", }, { category: "external", summary: "SUSE Bug 1153993 for CVE-2019-6476", url: "https://bugzilla.suse.com/1153993", }, { category: "external", summary: "SUSE Bug 1153994 for CVE-2019-6476", url: "https://bugzilla.suse.com/1153994", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-6476", }, { cve: "CVE-2019-6477", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-6477", }, ], notes: [ { category: "general", text: "With pipelining enabled each incoming query on a TCP connection requires a similar resource allocation to a query received via UDP or via TCP without pipelining enabled. A client using a TCP-pipelined connection to a server could consume more resources than the server has been provisioned to handle. When a TCP connection with a large number of pipelined queries is closed, the load on the server releasing these multiple resources can cause it to become unresponsive, even for queries that can be answered authoritatively or from cache. (This is most likely to be perceived as an intermittent server problem).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-6477", url: "https://www.suse.com/security/cve/CVE-2019-6477", }, { category: "external", summary: "SUSE Bug 1157051 for CVE-2019-6477", url: "https://bugzilla.suse.com/1157051", }, { category: "external", summary: "SUSE Bug 1197136 for CVE-2019-6477", url: "https://bugzilla.suse.com/1197136", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2019-6477", }, { cve: "CVE-2020-8616", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-8616", }, ], notes: [ { category: "general", text: "A malicious actor who intentionally exploits this lack of effective limitation on the number of fetches performed when processing referrals can, through the use of specially crafted referrals, cause a recursing server to issue a very large number of fetches in an attempt to process the referral. This has at least two potential effects: The performance of the recursing server can potentially be degraded by the additional work required to perform these fetches, and The attacker can exploit this behavior to use the recursing server as a reflector in a reflection attack with a high amplification factor.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-8616", url: "https://www.suse.com/security/cve/CVE-2020-8616", }, { category: "external", summary: "SUSE Bug 1109160 for CVE-2020-8616", url: "https://bugzilla.suse.com/1109160", }, { category: "external", summary: "SUSE Bug 1171740 for CVE-2020-8616", url: "https://bugzilla.suse.com/1171740", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.6, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-8616", }, { cve: "CVE-2020-8617", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-8617", }, ], notes: [ { category: "general", text: "Using a specially-crafted message, an attacker may potentially cause a BIND server to reach an inconsistent state if the attacker knows (or successfully guesses) the name of a TSIG key used by the server. Since BIND, by default, configures a local session key even on servers whose configuration does not otherwise make use of it, almost all current BIND servers are vulnerable. In releases of BIND dating from March 2018 and after, an assertion check in tsig.c detects this inconsistent state and deliberately exits. Prior to the introduction of the check the server would continue operating in an inconsistent state, with potentially harmful results.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-8617", url: "https://www.suse.com/security/cve/CVE-2020-8617", }, { category: "external", summary: "SUSE Bug 1109160 for CVE-2020-8617", url: "https://bugzilla.suse.com/1109160", }, { category: "external", summary: "SUSE Bug 1171740 for CVE-2020-8617", url: "https://bugzilla.suse.com/1171740", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-8617", }, { cve: "CVE-2020-8618", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-8618", }, ], notes: [ { category: "general", text: "An attacker who is permitted to send zone data to a server via zone transfer can exploit this to intentionally trigger the assertion failure with a specially constructed zone, denying service to clients.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-8618", url: "https://www.suse.com/security/cve/CVE-2020-8618", }, { category: "external", summary: "SUSE Bug 1172958 for CVE-2020-8618", url: "https://bugzilla.suse.com/1172958", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-8618", }, { cve: "CVE-2020-8619", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-8619", }, ], notes: [ { category: "general", text: "In ISC BIND9 versions BIND 9.11.14 -> 9.11.19, BIND 9.14.9 -> 9.14.12, BIND 9.16.0 -> 9.16.3, BIND Supported Preview Edition 9.11.14-S1 -> 9.11.19-S1: Unless a nameserver is providing authoritative service for one or more zones and at least one zone contains an empty non-terminal entry containing an asterisk (\"*\") character, this defect cannot be encountered. A would-be attacker who is allowed to change zone content could theoretically introduce such a record in order to exploit this condition to cause denial of service, though we consider the use of this vector unlikely because any such attack would require a significant privilege level and be easily traceable.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-8619", url: "https://www.suse.com/security/cve/CVE-2020-8619", }, { category: "external", summary: "SUSE Bug 1172958 for CVE-2020-8619", url: "https://bugzilla.suse.com/1172958", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-8619", }, { cve: "CVE-2020-8620", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-8620", }, ], notes: [ { category: "general", text: "In BIND 9.15.6 -> 9.16.5, 9.17.0 -> 9.17.3, An attacker who can establish a TCP connection with the server and send data on that connection can exploit this to trigger the assertion failure, causing the server to exit.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-8620", url: "https://www.suse.com/security/cve/CVE-2020-8620", }, { category: "external", summary: "SUSE Bug 1175443 for CVE-2020-8620", url: "https://bugzilla.suse.com/1175443", }, { category: "external", summary: "SUSE Bug 1191120 for CVE-2020-8620", url: "https://bugzilla.suse.com/1191120", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-8620", }, { cve: "CVE-2020-8621", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-8621", }, ], notes: [ { category: "general", text: "In BIND 9.14.0 -> 9.16.5, 9.17.0 -> 9.17.3, If a server is configured with both QNAME minimization and 'forward first' then an attacker who can send queries to it may be able to trigger the condition that will cause the server to crash. Servers that 'forward only' are not affected.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-8621", url: "https://www.suse.com/security/cve/CVE-2020-8621", }, { category: "external", summary: "SUSE Bug 1175443 for CVE-2020-8621", url: "https://bugzilla.suse.com/1175443", }, { category: "external", summary: "SUSE Bug 1191120 for CVE-2020-8621", url: "https://bugzilla.suse.com/1191120", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-8621", }, { cve: "CVE-2020-8622", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-8622", }, ], notes: [ { category: "general", text: "In BIND 9.0.0 -> 9.11.21, 9.12.0 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.9.3-S1 -> 9.11.21-S1 of the BIND 9 Supported Preview Edition, An attacker on the network path for a TSIG-signed request, or operating the server receiving the TSIG-signed request, could send a truncated response to that request, triggering an assertion failure, causing the server to exit. Alternately, an off-path attacker would have to correctly guess when a TSIG-signed request was sent, along with other characteristics of the packet and message, and spoof a truncated response to trigger an assertion failure, causing the server to exit.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-8622", url: "https://www.suse.com/security/cve/CVE-2020-8622", }, { category: "external", summary: "SUSE Bug 1175443 for CVE-2020-8622", url: "https://bugzilla.suse.com/1175443", }, { category: "external", summary: "SUSE Bug 1188888 for CVE-2020-8622", url: "https://bugzilla.suse.com/1188888", }, { category: "external", summary: "SUSE Bug 1191120 for CVE-2020-8622", url: "https://bugzilla.suse.com/1191120", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-8622", }, { cve: "CVE-2020-8623", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-8623", }, ], notes: [ { category: "general", text: "In BIND 9.10.0 -> 9.11.21, 9.12.0 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.10.5-S1 -> 9.11.21-S1 of the BIND 9 Supported Preview Edition, An attacker that can reach a vulnerable system with a specially crafted query packet can trigger a crash. To be vulnerable, the system must: * be running BIND that was built with \"--enable-native-pkcs11\" * be signing one or more zones with an RSA key * be able to receive queries from a possible attacker", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-8623", url: "https://www.suse.com/security/cve/CVE-2020-8623", }, { category: "external", summary: "SUSE Bug 1175443 for CVE-2020-8623", url: "https://bugzilla.suse.com/1175443", }, { category: "external", summary: "SUSE Bug 1191120 for CVE-2020-8623", url: "https://bugzilla.suse.com/1191120", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-8623", }, { cve: "CVE-2020-8624", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-8624", }, ], notes: [ { category: "general", text: "In BIND 9.9.12 -> 9.9.13, 9.10.7 -> 9.10.8, 9.11.3 -> 9.11.21, 9.12.1 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.9.12-S1 -> 9.9.13-S1, 9.11.3-S1 -> 9.11.21-S1 of the BIND 9 Supported Preview Edition, An attacker who has been granted privileges to change a specific subset of the zone's content could abuse these unintended additional privileges to update other contents of the zone.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-8624", url: "https://www.suse.com/security/cve/CVE-2020-8624", }, { category: "external", summary: "SUSE Bug 1175443 for CVE-2020-8624", url: "https://bugzilla.suse.com/1175443", }, { category: "external", summary: "SUSE Bug 1191120 for CVE-2020-8624", url: "https://bugzilla.suse.com/1191120", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-8624", }, { cve: "CVE-2020-8625", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-8625", }, ], notes: [ { category: "general", text: "BIND servers are vulnerable if they are running an affected version and are configured to use GSS-TSIG features. In a configuration which uses BIND's default settings the vulnerable code path is not exposed, but a server can be rendered vulnerable by explicitly setting valid values for the tkey-gssapi-keytab or tkey-gssapi-credentialconfiguration options. Although the default configuration is not vulnerable, GSS-TSIG is frequently used in networks where BIND is integrated with Samba, as well as in mixed-server environments that combine BIND servers with Active Directory domain controllers. The most likely outcome of a successful exploitation of the vulnerability is a crash of the named process. However, remote code execution, while unproven, is theoretically possible. Affects: BIND 9.5.0 -> 9.11.27, 9.12.0 -> 9.16.11, and versions BIND 9.11.3-S1 -> 9.11.27-S1 and 9.16.8-S1 -> 9.16.11-S1 of BIND Supported Preview Edition. Also release versions 9.17.0 -> 9.17.1 of the BIND 9.17 development branch", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-8625", url: "https://www.suse.com/security/cve/CVE-2020-8625", }, { category: "external", summary: "SUSE Bug 1182246 for CVE-2020-8625", url: "https://bugzilla.suse.com/1182246", }, { category: "external", summary: "SUSE Bug 1182483 for CVE-2020-8625", url: "https://bugzilla.suse.com/1182483", }, { category: "external", summary: "SUSE Bug 1192708 for CVE-2020-8625", url: "https://bugzilla.suse.com/1192708", }, { category: "external", summary: "SUSE Bug 1196172 for CVE-2020-8625", url: "https://bugzilla.suse.com/1196172", }, { category: "external", summary: "SUSE Bug 1218478 for CVE-2020-8625", url: "https://bugzilla.suse.com/1218478", }, { category: "external", summary: "SUSE Bug 1225626 for CVE-2020-8625", url: "https://bugzilla.suse.com/1225626", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-8625", }, { cve: "CVE-2021-25214", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-25214", }, ], notes: [ { category: "general", text: "In BIND 9.8.5 -> 9.8.8, 9.9.3 -> 9.11.29, 9.12.0 -> 9.16.13, and versions BIND 9.9.3-S1 -> 9.11.29-S1 and 9.16.8-S1 -> 9.16.13-S1 of BIND 9 Supported Preview Edition, as well as release versions 9.17.0 -> 9.17.11 of the BIND 9.17 development branch, when a vulnerable version of named receives a malformed IXFR triggering the flaw described above, the named process will terminate due to a failed assertion the next time the transferred secondary zone is refreshed.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-25214", url: "https://www.suse.com/security/cve/CVE-2021-25214", }, { category: "external", summary: "SUSE Bug 1185345 for CVE-2021-25214", url: "https://bugzilla.suse.com/1185345", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2021-25214", }, { cve: "CVE-2021-25215", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-25215", }, ], notes: [ { category: "general", text: "In BIND 9.0.0 -> 9.11.29, 9.12.0 -> 9.16.13, and versions BIND 9.9.3-S1 -> 9.11.29-S1 and 9.16.8-S1 -> 9.16.13-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -> 9.17.11 of the BIND 9.17 development branch, when a vulnerable version of named receives a query for a record triggering the flaw described above, the named process will terminate due to a failed assertion check. The vulnerability affects all currently maintained BIND 9 branches (9.11, 9.11-S, 9.16, 9.16-S, 9.17) as well as all other versions of BIND 9.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-25215", url: "https://www.suse.com/security/cve/CVE-2021-25215", }, { category: "external", summary: "SUSE Bug 1185345 for CVE-2021-25215", url: "https://bugzilla.suse.com/1185345", }, { category: "external", summary: "SUSE Bug 1189848 for CVE-2021-25215", url: "https://bugzilla.suse.com/1189848", }, { category: "external", summary: "SUSE Bug 1196172 for CVE-2021-25215", url: "https://bugzilla.suse.com/1196172", }, { category: "external", summary: "SUSE Bug 1199298 for CVE-2021-25215", url: "https://bugzilla.suse.com/1199298", }, { category: "external", summary: "SUSE Bug 1225626 for CVE-2021-25215", url: "https://bugzilla.suse.com/1225626", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2021-25215", }, { cve: "CVE-2021-25216", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-25216", }, ], notes: [ { category: "general", text: "In BIND 9.5.0 -> 9.11.29, 9.12.0 -> 9.16.13, and versions BIND 9.11.3-S1 -> 9.11.29-S1 and 9.16.8-S1 -> 9.16.13-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -> 9.17.1 of the BIND 9.17 development branch, BIND servers are vulnerable if they are running an affected version and are configured to use GSS-TSIG features. In a configuration which uses BIND's default settings the vulnerable code path is not exposed, but a server can be rendered vulnerable by explicitly setting values for the tkey-gssapi-keytab or tkey-gssapi-credential configuration options. Although the default configuration is not vulnerable, GSS-TSIG is frequently used in networks where BIND is integrated with Samba, as well as in mixed-server environments that combine BIND servers with Active Directory domain controllers. For servers that meet these conditions, the ISC SPNEGO implementation is vulnerable to various attacks, depending on the CPU architecture for which BIND was built: For named binaries compiled for 64-bit platforms, this flaw can be used to trigger a buffer over-read, leading to a server crash. For named binaries compiled for 32-bit platforms, this flaw can be used to trigger a server crash due to a buffer overflow and possibly also to achieve remote code execution. We have determined that standard SPNEGO implementations are available in the MIT and Heimdal Kerberos libraries, which support a broad range of operating systems, rendering the ISC implementation unnecessary and obsolete. Therefore, to reduce the attack surface for BIND users, we will be removing the ISC SPNEGO implementation in the April releases of BIND 9.11 and 9.16 (it had already been dropped from BIND 9.17). We would not normally remove something from a stable ESV (Extended Support Version) of BIND, but since system libraries can replace the ISC SPNEGO implementation, we have made an exception in this case for reasons of stability and security.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-25216", url: "https://www.suse.com/security/cve/CVE-2021-25216", }, { category: "external", summary: "SUSE Bug 1185345 for CVE-2021-25216", url: "https://bugzilla.suse.com/1185345", }, { category: "external", summary: "SUSE Bug 1189848 for CVE-2021-25216", url: "https://bugzilla.suse.com/1189848", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2021-25216", }, { cve: "CVE-2021-25218", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-25218", }, ], notes: [ { category: "general", text: "In BIND 9.16.19, 9.17.16. Also, version 9.16.19-S1 of BIND Supported Preview Edition When a vulnerable version of named receives a query under the circumstances described above, the named process will terminate due to a failed assertion check. The vulnerability affects only BIND 9 releases 9.16.19, 9.17.16, and release 9.16.19-S1 of the BIND Supported Preview Edition.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-25218", url: "https://www.suse.com/security/cve/CVE-2021-25218", }, { category: "external", summary: "SUSE Bug 1189460 for CVE-2021-25218", url: "https://bugzilla.suse.com/1189460", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-doc-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.s390x", "openSUSE Tumbleweed:bind-utils-9.16.20-1.4.x86_64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.aarch64", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.ppc64le", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.s390x", "openSUSE Tumbleweed:python3-bind-9.16.20-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2021-25218", }, ], }
suse-su-2021:1469-1
Vulnerability from csaf_suse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for bind", title: "Title of the patch", }, { category: "description", text: "This update for bind fixes the following issues:\n\n- CVE-2021-25214: Fixed a broken inbound incremental zone update (IXFR) which could have caused named to terminate unexpectedly (bsc#1185345).\n- CVE-2021-25215: Fixed an assertion check which could have failed while answering queries for DNAME records that required the DNAME to be processed to resolve itself (bsc#1185345).\n- CVE-2021-25216: Fixed an issue where policy negotiation can be targeted by a buffer overflow attack (bsc#1185345).\n- MD5 warning message using host, dig, nslookup (bind-utils) with FIPS enabled (bsc#1181495).\n", title: "Description of the patch", }, { category: "details", text: "HPE-Helion-OpenStack-8-2021-1469,SUSE-2021-1469,SUSE-OpenStack-Cloud-8-2021-1469,SUSE-OpenStack-Cloud-Crowbar-8-2021-1469,SUSE-SLE-SAP-12-SP3-2021-1469,SUSE-SLE-SERVER-12-SP2-BCL-2021-1469,SUSE-SLE-SERVER-12-SP2-LTSS-ERICSSON-2021-1469,SUSE-SLE-SERVER-12-SP2-LTSS-SAP-2021-1469,SUSE-SLE-SERVER-12-SP3-2021-1469,SUSE-SLE-SERVER-12-SP3-BCL-2021-1469", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_1469-1.json", }, { category: "self", summary: "URL for SUSE-SU-2021:1469-1", url: "https://www.suse.com/support/update/announcement/2021/suse-su-20211469-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2021:1469-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2021-May/008723.html", }, { category: "self", summary: "SUSE Bug 1181495", url: "https://bugzilla.suse.com/1181495", }, { category: "self", summary: "SUSE Bug 1185345", url: "https://bugzilla.suse.com/1185345", }, { category: "self", summary: "SUSE CVE CVE-2021-25214 page", url: "https://www.suse.com/security/cve/CVE-2021-25214/", }, { category: "self", summary: "SUSE CVE CVE-2021-25215 page", url: "https://www.suse.com/security/cve/CVE-2021-25215/", }, { category: "self", summary: "SUSE CVE CVE-2021-25216 page", url: "https://www.suse.com/security/cve/CVE-2021-25216/", }, ], title: "Security update for bind", tracking: { current_release_date: "2021-05-04T06:34:07Z", generator: { date: "2021-05-04T06:34:07Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2021:1469-1", initial_release_date: "2021-05-04T06:34:07Z", revision_history: [ { date: "2021-05-04T06:34:07Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "bind-9.9.9P1-63.25.1.aarch64", product: { name: "bind-9.9.9P1-63.25.1.aarch64", product_id: "bind-9.9.9P1-63.25.1.aarch64", }, }, { category: "product_version", name: "bind-chrootenv-9.9.9P1-63.25.1.aarch64", product: { name: "bind-chrootenv-9.9.9P1-63.25.1.aarch64", product_id: "bind-chrootenv-9.9.9P1-63.25.1.aarch64", }, }, { category: "product_version", name: "bind-devel-9.9.9P1-63.25.1.aarch64", product: { name: "bind-devel-9.9.9P1-63.25.1.aarch64", product_id: "bind-devel-9.9.9P1-63.25.1.aarch64", }, }, { category: "product_version", name: "bind-libs-9.9.9P1-63.25.1.aarch64", product: { name: "bind-libs-9.9.9P1-63.25.1.aarch64", product_id: "bind-libs-9.9.9P1-63.25.1.aarch64", }, }, { category: "product_version", name: "bind-lwresd-9.9.9P1-63.25.1.aarch64", product: { name: "bind-lwresd-9.9.9P1-63.25.1.aarch64", product_id: "bind-lwresd-9.9.9P1-63.25.1.aarch64", }, }, { category: "product_version", name: "bind-utils-9.9.9P1-63.25.1.aarch64", product: { name: "bind-utils-9.9.9P1-63.25.1.aarch64", product_id: "bind-utils-9.9.9P1-63.25.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "bind-libs-64bit-9.9.9P1-63.25.1.aarch64_ilp32", product: { name: "bind-libs-64bit-9.9.9P1-63.25.1.aarch64_ilp32", product_id: "bind-libs-64bit-9.9.9P1-63.25.1.aarch64_ilp32", }, }, ], category: "architecture", name: "aarch64_ilp32", }, { branches: [ { category: "product_version", name: "bind-9.9.9P1-63.25.1.i586", product: { name: "bind-9.9.9P1-63.25.1.i586", product_id: "bind-9.9.9P1-63.25.1.i586", }, }, { category: "product_version", name: "bind-chrootenv-9.9.9P1-63.25.1.i586", product: { name: "bind-chrootenv-9.9.9P1-63.25.1.i586", product_id: "bind-chrootenv-9.9.9P1-63.25.1.i586", }, }, { category: "product_version", name: "bind-devel-9.9.9P1-63.25.1.i586", product: { name: "bind-devel-9.9.9P1-63.25.1.i586", product_id: "bind-devel-9.9.9P1-63.25.1.i586", }, }, { category: "product_version", name: "bind-libs-9.9.9P1-63.25.1.i586", product: { name: "bind-libs-9.9.9P1-63.25.1.i586", product_id: "bind-libs-9.9.9P1-63.25.1.i586", }, }, { category: "product_version", name: "bind-lwresd-9.9.9P1-63.25.1.i586", product: { name: "bind-lwresd-9.9.9P1-63.25.1.i586", product_id: "bind-lwresd-9.9.9P1-63.25.1.i586", }, }, { category: "product_version", name: "bind-utils-9.9.9P1-63.25.1.i586", product: { name: "bind-utils-9.9.9P1-63.25.1.i586", product_id: "bind-utils-9.9.9P1-63.25.1.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "bind-doc-9.9.9P1-63.25.1.noarch", product: { name: "bind-doc-9.9.9P1-63.25.1.noarch", product_id: "bind-doc-9.9.9P1-63.25.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "bind-9.9.9P1-63.25.1.ppc64le", product: { name: "bind-9.9.9P1-63.25.1.ppc64le", product_id: "bind-9.9.9P1-63.25.1.ppc64le", }, }, { category: "product_version", name: "bind-chrootenv-9.9.9P1-63.25.1.ppc64le", product: { name: "bind-chrootenv-9.9.9P1-63.25.1.ppc64le", product_id: "bind-chrootenv-9.9.9P1-63.25.1.ppc64le", }, }, { category: "product_version", name: "bind-devel-9.9.9P1-63.25.1.ppc64le", product: { name: "bind-devel-9.9.9P1-63.25.1.ppc64le", product_id: "bind-devel-9.9.9P1-63.25.1.ppc64le", }, }, { category: "product_version", name: "bind-libs-9.9.9P1-63.25.1.ppc64le", product: { name: "bind-libs-9.9.9P1-63.25.1.ppc64le", product_id: "bind-libs-9.9.9P1-63.25.1.ppc64le", }, }, { category: "product_version", name: "bind-lwresd-9.9.9P1-63.25.1.ppc64le", product: { name: "bind-lwresd-9.9.9P1-63.25.1.ppc64le", product_id: "bind-lwresd-9.9.9P1-63.25.1.ppc64le", }, }, { category: "product_version", name: "bind-utils-9.9.9P1-63.25.1.ppc64le", product: { name: "bind-utils-9.9.9P1-63.25.1.ppc64le", product_id: "bind-utils-9.9.9P1-63.25.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "bind-9.9.9P1-63.25.1.s390", product: { name: "bind-9.9.9P1-63.25.1.s390", product_id: "bind-9.9.9P1-63.25.1.s390", }, }, { category: "product_version", name: "bind-chrootenv-9.9.9P1-63.25.1.s390", product: { name: "bind-chrootenv-9.9.9P1-63.25.1.s390", product_id: "bind-chrootenv-9.9.9P1-63.25.1.s390", }, }, { category: "product_version", name: "bind-devel-9.9.9P1-63.25.1.s390", product: { name: "bind-devel-9.9.9P1-63.25.1.s390", product_id: "bind-devel-9.9.9P1-63.25.1.s390", }, }, { category: "product_version", name: "bind-libs-9.9.9P1-63.25.1.s390", product: { name: "bind-libs-9.9.9P1-63.25.1.s390", product_id: "bind-libs-9.9.9P1-63.25.1.s390", }, }, { category: "product_version", name: "bind-lwresd-9.9.9P1-63.25.1.s390", product: { name: "bind-lwresd-9.9.9P1-63.25.1.s390", product_id: "bind-lwresd-9.9.9P1-63.25.1.s390", }, }, { category: "product_version", name: "bind-utils-9.9.9P1-63.25.1.s390", product: { name: "bind-utils-9.9.9P1-63.25.1.s390", product_id: "bind-utils-9.9.9P1-63.25.1.s390", }, }, ], category: "architecture", name: "s390", }, { branches: [ { category: "product_version", name: "bind-9.9.9P1-63.25.1.s390x", product: { name: "bind-9.9.9P1-63.25.1.s390x", product_id: "bind-9.9.9P1-63.25.1.s390x", }, }, { category: "product_version", name: "bind-chrootenv-9.9.9P1-63.25.1.s390x", product: { name: "bind-chrootenv-9.9.9P1-63.25.1.s390x", product_id: "bind-chrootenv-9.9.9P1-63.25.1.s390x", }, }, { category: "product_version", name: "bind-devel-9.9.9P1-63.25.1.s390x", product: { name: "bind-devel-9.9.9P1-63.25.1.s390x", product_id: "bind-devel-9.9.9P1-63.25.1.s390x", }, }, { category: "product_version", name: "bind-libs-9.9.9P1-63.25.1.s390x", product: { name: "bind-libs-9.9.9P1-63.25.1.s390x", product_id: "bind-libs-9.9.9P1-63.25.1.s390x", }, }, { category: "product_version", name: "bind-libs-32bit-9.9.9P1-63.25.1.s390x", product: { name: "bind-libs-32bit-9.9.9P1-63.25.1.s390x", product_id: "bind-libs-32bit-9.9.9P1-63.25.1.s390x", }, }, { category: "product_version", name: "bind-lwresd-9.9.9P1-63.25.1.s390x", product: { name: "bind-lwresd-9.9.9P1-63.25.1.s390x", product_id: "bind-lwresd-9.9.9P1-63.25.1.s390x", }, }, { category: "product_version", name: "bind-utils-9.9.9P1-63.25.1.s390x", product: { name: "bind-utils-9.9.9P1-63.25.1.s390x", product_id: "bind-utils-9.9.9P1-63.25.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "bind-9.9.9P1-63.25.1.x86_64", product: { name: "bind-9.9.9P1-63.25.1.x86_64", product_id: "bind-9.9.9P1-63.25.1.x86_64", }, }, { category: "product_version", name: "bind-chrootenv-9.9.9P1-63.25.1.x86_64", product: { name: "bind-chrootenv-9.9.9P1-63.25.1.x86_64", product_id: "bind-chrootenv-9.9.9P1-63.25.1.x86_64", }, }, { category: "product_version", name: "bind-libs-9.9.9P1-63.25.1.x86_64", product: { name: "bind-libs-9.9.9P1-63.25.1.x86_64", product_id: "bind-libs-9.9.9P1-63.25.1.x86_64", }, }, { category: "product_version", name: "bind-libs-32bit-9.9.9P1-63.25.1.x86_64", product: { name: "bind-libs-32bit-9.9.9P1-63.25.1.x86_64", product_id: "bind-libs-32bit-9.9.9P1-63.25.1.x86_64", }, }, { category: "product_version", name: "bind-utils-9.9.9P1-63.25.1.x86_64", product: { name: "bind-utils-9.9.9P1-63.25.1.x86_64", product_id: "bind-utils-9.9.9P1-63.25.1.x86_64", }, }, { category: "product_version", name: "bind-devel-9.9.9P1-63.25.1.x86_64", product: { name: "bind-devel-9.9.9P1-63.25.1.x86_64", product_id: "bind-devel-9.9.9P1-63.25.1.x86_64", }, }, { category: "product_version", name: "bind-lwresd-9.9.9P1-63.25.1.x86_64", product: { name: "bind-lwresd-9.9.9P1-63.25.1.x86_64", product_id: "bind-lwresd-9.9.9P1-63.25.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "HPE Helion OpenStack 8", product: { name: "HPE Helion OpenStack 8", product_id: "HPE Helion OpenStack 8", product_identification_helper: { cpe: "cpe:/o:suse:hpe-helion-openstack:8", }, }, }, { category: "product_name", name: "SUSE OpenStack Cloud 8", product: { name: "SUSE OpenStack Cloud 8", product_id: "SUSE OpenStack Cloud 8", product_identification_helper: { cpe: "cpe:/o:suse:suse-openstack-cloud:8", }, }, }, { category: "product_name", name: "SUSE OpenStack Cloud Crowbar 8", product: { name: "SUSE OpenStack Cloud Crowbar 8", product_id: "SUSE OpenStack Cloud Crowbar 8", product_identification_helper: { cpe: "cpe:/o:suse:suse-openstack-cloud-crowbar:8", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP2-BCL", product: { name: "SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL", product_identification_helper: { cpe: "cpe:/o:suse:sles-bcl:12:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP3-LTSS", product: { name: "SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:12:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP3-BCL", product: { name: "SUSE Linux Enterprise Server 12 SP3-BCL", product_id: "SUSE Linux Enterprise Server 12 SP3-BCL", product_identification_helper: { cpe: "cpe:/o:suse:sles-bcl:12:sp3", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "bind-9.9.9P1-63.25.1.x86_64 as component of HPE Helion OpenStack 8", product_id: "HPE Helion OpenStack 8:bind-9.9.9P1-63.25.1.x86_64", }, product_reference: "bind-9.9.9P1-63.25.1.x86_64", relates_to_product_reference: "HPE Helion OpenStack 8", }, { category: "default_component_of", full_product_name: { name: "bind-chrootenv-9.9.9P1-63.25.1.x86_64 as component of HPE Helion OpenStack 8", product_id: "HPE Helion OpenStack 8:bind-chrootenv-9.9.9P1-63.25.1.x86_64", }, product_reference: "bind-chrootenv-9.9.9P1-63.25.1.x86_64", relates_to_product_reference: "HPE Helion OpenStack 8", }, { category: "default_component_of", full_product_name: { name: "bind-doc-9.9.9P1-63.25.1.noarch as component of HPE Helion OpenStack 8", product_id: "HPE Helion OpenStack 8:bind-doc-9.9.9P1-63.25.1.noarch", }, product_reference: "bind-doc-9.9.9P1-63.25.1.noarch", relates_to_product_reference: "HPE Helion OpenStack 8", }, { category: "default_component_of", full_product_name: { name: "bind-libs-9.9.9P1-63.25.1.x86_64 as component of HPE Helion OpenStack 8", product_id: "HPE Helion OpenStack 8:bind-libs-9.9.9P1-63.25.1.x86_64", }, product_reference: "bind-libs-9.9.9P1-63.25.1.x86_64", relates_to_product_reference: "HPE Helion OpenStack 8", }, { category: "default_component_of", full_product_name: { name: "bind-libs-32bit-9.9.9P1-63.25.1.x86_64 as component of HPE Helion OpenStack 8", product_id: "HPE Helion OpenStack 8:bind-libs-32bit-9.9.9P1-63.25.1.x86_64", }, product_reference: "bind-libs-32bit-9.9.9P1-63.25.1.x86_64", relates_to_product_reference: "HPE Helion OpenStack 8", }, { category: "default_component_of", full_product_name: { name: "bind-utils-9.9.9P1-63.25.1.x86_64 as component of HPE Helion OpenStack 8", product_id: "HPE Helion OpenStack 8:bind-utils-9.9.9P1-63.25.1.x86_64", }, product_reference: "bind-utils-9.9.9P1-63.25.1.x86_64", relates_to_product_reference: "HPE Helion OpenStack 8", }, { category: "default_component_of", full_product_name: { name: "bind-9.9.9P1-63.25.1.x86_64 as component of SUSE OpenStack Cloud 8", product_id: "SUSE OpenStack Cloud 8:bind-9.9.9P1-63.25.1.x86_64", }, product_reference: "bind-9.9.9P1-63.25.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 8", }, { category: "default_component_of", full_product_name: { name: "bind-chrootenv-9.9.9P1-63.25.1.x86_64 as component of SUSE OpenStack Cloud 8", product_id: "SUSE OpenStack Cloud 8:bind-chrootenv-9.9.9P1-63.25.1.x86_64", }, product_reference: "bind-chrootenv-9.9.9P1-63.25.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 8", }, { category: "default_component_of", full_product_name: { name: "bind-doc-9.9.9P1-63.25.1.noarch as component of SUSE OpenStack Cloud 8", product_id: "SUSE OpenStack Cloud 8:bind-doc-9.9.9P1-63.25.1.noarch", }, product_reference: "bind-doc-9.9.9P1-63.25.1.noarch", relates_to_product_reference: "SUSE OpenStack Cloud 8", }, { category: "default_component_of", full_product_name: { name: "bind-libs-9.9.9P1-63.25.1.x86_64 as component of SUSE OpenStack Cloud 8", product_id: "SUSE OpenStack Cloud 8:bind-libs-9.9.9P1-63.25.1.x86_64", }, product_reference: "bind-libs-9.9.9P1-63.25.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 8", }, { category: "default_component_of", full_product_name: { name: "bind-libs-32bit-9.9.9P1-63.25.1.x86_64 as component of SUSE OpenStack Cloud 8", product_id: "SUSE OpenStack Cloud 8:bind-libs-32bit-9.9.9P1-63.25.1.x86_64", }, product_reference: "bind-libs-32bit-9.9.9P1-63.25.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 8", }, { category: "default_component_of", full_product_name: { name: "bind-utils-9.9.9P1-63.25.1.x86_64 as component of SUSE OpenStack Cloud 8", product_id: "SUSE OpenStack Cloud 8:bind-utils-9.9.9P1-63.25.1.x86_64", }, product_reference: "bind-utils-9.9.9P1-63.25.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 8", }, { category: "default_component_of", full_product_name: { name: "bind-9.9.9P1-63.25.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", product_id: "SUSE OpenStack Cloud Crowbar 8:bind-9.9.9P1-63.25.1.x86_64", }, product_reference: "bind-9.9.9P1-63.25.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud Crowbar 8", }, { category: "default_component_of", full_product_name: { name: "bind-chrootenv-9.9.9P1-63.25.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", product_id: "SUSE OpenStack Cloud Crowbar 8:bind-chrootenv-9.9.9P1-63.25.1.x86_64", }, product_reference: "bind-chrootenv-9.9.9P1-63.25.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud Crowbar 8", }, { category: "default_component_of", full_product_name: { name: "bind-doc-9.9.9P1-63.25.1.noarch as component of SUSE OpenStack Cloud Crowbar 8", product_id: "SUSE OpenStack Cloud Crowbar 8:bind-doc-9.9.9P1-63.25.1.noarch", }, product_reference: "bind-doc-9.9.9P1-63.25.1.noarch", relates_to_product_reference: "SUSE OpenStack Cloud Crowbar 8", }, { category: "default_component_of", full_product_name: { name: "bind-libs-9.9.9P1-63.25.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", product_id: "SUSE OpenStack Cloud Crowbar 8:bind-libs-9.9.9P1-63.25.1.x86_64", }, product_reference: "bind-libs-9.9.9P1-63.25.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud Crowbar 8", }, { category: "default_component_of", full_product_name: { name: "bind-libs-32bit-9.9.9P1-63.25.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", product_id: "SUSE OpenStack Cloud Crowbar 8:bind-libs-32bit-9.9.9P1-63.25.1.x86_64", }, product_reference: "bind-libs-32bit-9.9.9P1-63.25.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud Crowbar 8", }, { category: "default_component_of", full_product_name: { name: "bind-utils-9.9.9P1-63.25.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", product_id: "SUSE OpenStack Cloud Crowbar 8:bind-utils-9.9.9P1-63.25.1.x86_64", }, product_reference: "bind-utils-9.9.9P1-63.25.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud Crowbar 8", }, { category: "default_component_of", full_product_name: { name: "bind-9.9.9P1-63.25.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:bind-9.9.9P1-63.25.1.ppc64le", }, product_reference: "bind-9.9.9P1-63.25.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "bind-9.9.9P1-63.25.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:bind-9.9.9P1-63.25.1.x86_64", }, product_reference: "bind-9.9.9P1-63.25.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "bind-chrootenv-9.9.9P1-63.25.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:bind-chrootenv-9.9.9P1-63.25.1.ppc64le", }, product_reference: "bind-chrootenv-9.9.9P1-63.25.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "bind-chrootenv-9.9.9P1-63.25.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:bind-chrootenv-9.9.9P1-63.25.1.x86_64", }, product_reference: "bind-chrootenv-9.9.9P1-63.25.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "bind-doc-9.9.9P1-63.25.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:bind-doc-9.9.9P1-63.25.1.noarch", }, product_reference: "bind-doc-9.9.9P1-63.25.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "bind-libs-9.9.9P1-63.25.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:bind-libs-9.9.9P1-63.25.1.ppc64le", }, product_reference: "bind-libs-9.9.9P1-63.25.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "bind-libs-9.9.9P1-63.25.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:bind-libs-9.9.9P1-63.25.1.x86_64", }, product_reference: "bind-libs-9.9.9P1-63.25.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "bind-libs-32bit-9.9.9P1-63.25.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:bind-libs-32bit-9.9.9P1-63.25.1.x86_64", }, product_reference: "bind-libs-32bit-9.9.9P1-63.25.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "bind-utils-9.9.9P1-63.25.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:bind-utils-9.9.9P1-63.25.1.ppc64le", }, product_reference: "bind-utils-9.9.9P1-63.25.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "bind-utils-9.9.9P1-63.25.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:bind-utils-9.9.9P1-63.25.1.x86_64", }, product_reference: "bind-utils-9.9.9P1-63.25.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "bind-9.9.9P1-63.25.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL:bind-9.9.9P1-63.25.1.x86_64", }, product_reference: "bind-9.9.9P1-63.25.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "bind-chrootenv-9.9.9P1-63.25.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL:bind-chrootenv-9.9.9P1-63.25.1.x86_64", }, product_reference: "bind-chrootenv-9.9.9P1-63.25.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "bind-doc-9.9.9P1-63.25.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL:bind-doc-9.9.9P1-63.25.1.noarch", }, product_reference: "bind-doc-9.9.9P1-63.25.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "bind-libs-9.9.9P1-63.25.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL:bind-libs-9.9.9P1-63.25.1.x86_64", }, product_reference: "bind-libs-9.9.9P1-63.25.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "bind-libs-32bit-9.9.9P1-63.25.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL:bind-libs-32bit-9.9.9P1-63.25.1.x86_64", }, product_reference: "bind-libs-32bit-9.9.9P1-63.25.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "bind-utils-9.9.9P1-63.25.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL:bind-utils-9.9.9P1-63.25.1.x86_64", }, product_reference: "bind-utils-9.9.9P1-63.25.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "bind-9.9.9P1-63.25.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-9.9.9P1-63.25.1.aarch64", }, product_reference: "bind-9.9.9P1-63.25.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "bind-9.9.9P1-63.25.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-9.9.9P1-63.25.1.ppc64le", }, product_reference: "bind-9.9.9P1-63.25.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "bind-9.9.9P1-63.25.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-9.9.9P1-63.25.1.s390x", }, product_reference: "bind-9.9.9P1-63.25.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "bind-9.9.9P1-63.25.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-9.9.9P1-63.25.1.x86_64", }, product_reference: "bind-9.9.9P1-63.25.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "bind-chrootenv-9.9.9P1-63.25.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-chrootenv-9.9.9P1-63.25.1.aarch64", }, product_reference: "bind-chrootenv-9.9.9P1-63.25.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "bind-chrootenv-9.9.9P1-63.25.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-chrootenv-9.9.9P1-63.25.1.ppc64le", }, product_reference: "bind-chrootenv-9.9.9P1-63.25.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "bind-chrootenv-9.9.9P1-63.25.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-chrootenv-9.9.9P1-63.25.1.s390x", }, product_reference: "bind-chrootenv-9.9.9P1-63.25.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "bind-chrootenv-9.9.9P1-63.25.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-chrootenv-9.9.9P1-63.25.1.x86_64", }, product_reference: "bind-chrootenv-9.9.9P1-63.25.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "bind-doc-9.9.9P1-63.25.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-doc-9.9.9P1-63.25.1.noarch", }, product_reference: "bind-doc-9.9.9P1-63.25.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "bind-libs-9.9.9P1-63.25.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-libs-9.9.9P1-63.25.1.aarch64", }, product_reference: "bind-libs-9.9.9P1-63.25.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "bind-libs-9.9.9P1-63.25.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-libs-9.9.9P1-63.25.1.ppc64le", }, product_reference: "bind-libs-9.9.9P1-63.25.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "bind-libs-9.9.9P1-63.25.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-libs-9.9.9P1-63.25.1.s390x", }, product_reference: "bind-libs-9.9.9P1-63.25.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "bind-libs-9.9.9P1-63.25.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-libs-9.9.9P1-63.25.1.x86_64", }, product_reference: "bind-libs-9.9.9P1-63.25.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "bind-libs-32bit-9.9.9P1-63.25.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-libs-32bit-9.9.9P1-63.25.1.s390x", }, product_reference: "bind-libs-32bit-9.9.9P1-63.25.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "bind-libs-32bit-9.9.9P1-63.25.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-libs-32bit-9.9.9P1-63.25.1.x86_64", }, product_reference: "bind-libs-32bit-9.9.9P1-63.25.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "bind-utils-9.9.9P1-63.25.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-utils-9.9.9P1-63.25.1.aarch64", }, product_reference: "bind-utils-9.9.9P1-63.25.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "bind-utils-9.9.9P1-63.25.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-utils-9.9.9P1-63.25.1.ppc64le", }, product_reference: "bind-utils-9.9.9P1-63.25.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "bind-utils-9.9.9P1-63.25.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-utils-9.9.9P1-63.25.1.s390x", }, product_reference: "bind-utils-9.9.9P1-63.25.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "bind-utils-9.9.9P1-63.25.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-utils-9.9.9P1-63.25.1.x86_64", }, product_reference: "bind-utils-9.9.9P1-63.25.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "bind-9.9.9P1-63.25.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", product_id: "SUSE Linux Enterprise Server 12 SP3-BCL:bind-9.9.9P1-63.25.1.x86_64", }, product_reference: "bind-9.9.9P1-63.25.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-BCL", }, { category: "default_component_of", full_product_name: { name: "bind-chrootenv-9.9.9P1-63.25.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", product_id: "SUSE Linux Enterprise Server 12 SP3-BCL:bind-chrootenv-9.9.9P1-63.25.1.x86_64", }, product_reference: "bind-chrootenv-9.9.9P1-63.25.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-BCL", }, { category: "default_component_of", full_product_name: { name: "bind-doc-9.9.9P1-63.25.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-BCL", product_id: "SUSE Linux Enterprise Server 12 SP3-BCL:bind-doc-9.9.9P1-63.25.1.noarch", }, product_reference: "bind-doc-9.9.9P1-63.25.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-BCL", }, { category: "default_component_of", full_product_name: { name: "bind-libs-9.9.9P1-63.25.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", product_id: "SUSE Linux Enterprise Server 12 SP3-BCL:bind-libs-9.9.9P1-63.25.1.x86_64", }, product_reference: "bind-libs-9.9.9P1-63.25.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-BCL", }, { category: "default_component_of", full_product_name: { name: "bind-libs-32bit-9.9.9P1-63.25.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", product_id: "SUSE Linux Enterprise Server 12 SP3-BCL:bind-libs-32bit-9.9.9P1-63.25.1.x86_64", }, product_reference: "bind-libs-32bit-9.9.9P1-63.25.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-BCL", }, { category: "default_component_of", full_product_name: { name: "bind-utils-9.9.9P1-63.25.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", product_id: "SUSE Linux Enterprise Server 12 SP3-BCL:bind-utils-9.9.9P1-63.25.1.x86_64", }, product_reference: "bind-utils-9.9.9P1-63.25.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-BCL", }, ], }, vulnerabilities: [ { cve: "CVE-2021-25214", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-25214", }, ], notes: [ { category: "general", text: "In BIND 9.8.5 -> 9.8.8, 9.9.3 -> 9.11.29, 9.12.0 -> 9.16.13, and versions BIND 9.9.3-S1 -> 9.11.29-S1 and 9.16.8-S1 -> 9.16.13-S1 of BIND 9 Supported Preview Edition, as well as release versions 9.17.0 -> 9.17.11 of the BIND 9.17 development branch, when a vulnerable version of named receives a malformed IXFR triggering the flaw described above, the named process will terminate due to a failed assertion the next time the transferred secondary zone is refreshed.", title: "CVE description", }, ], product_status: { recommended: [ "HPE Helion OpenStack 8:bind-9.9.9P1-63.25.1.x86_64", "HPE Helion OpenStack 8:bind-chrootenv-9.9.9P1-63.25.1.x86_64", "HPE Helion OpenStack 8:bind-doc-9.9.9P1-63.25.1.noarch", "HPE Helion OpenStack 8:bind-libs-32bit-9.9.9P1-63.25.1.x86_64", "HPE Helion OpenStack 8:bind-libs-9.9.9P1-63.25.1.x86_64", "HPE Helion OpenStack 8:bind-utils-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:bind-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:bind-chrootenv-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:bind-doc-9.9.9P1-63.25.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:bind-libs-32bit-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:bind-libs-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:bind-utils-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:bind-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:bind-chrootenv-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:bind-doc-9.9.9P1-63.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:bind-libs-32bit-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:bind-libs-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:bind-utils-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-9.9.9P1-63.25.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-9.9.9P1-63.25.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-9.9.9P1-63.25.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-chrootenv-9.9.9P1-63.25.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-chrootenv-9.9.9P1-63.25.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-chrootenv-9.9.9P1-63.25.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-chrootenv-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-doc-9.9.9P1-63.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-libs-32bit-9.9.9P1-63.25.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-libs-32bit-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-libs-9.9.9P1-63.25.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-libs-9.9.9P1-63.25.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-libs-9.9.9P1-63.25.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-libs-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-utils-9.9.9P1-63.25.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-utils-9.9.9P1-63.25.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-utils-9.9.9P1-63.25.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-utils-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:bind-9.9.9P1-63.25.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:bind-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:bind-chrootenv-9.9.9P1-63.25.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:bind-chrootenv-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:bind-doc-9.9.9P1-63.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:bind-libs-32bit-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:bind-libs-9.9.9P1-63.25.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:bind-libs-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:bind-utils-9.9.9P1-63.25.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:bind-utils-9.9.9P1-63.25.1.x86_64", "SUSE OpenStack Cloud 8:bind-9.9.9P1-63.25.1.x86_64", "SUSE OpenStack Cloud 8:bind-chrootenv-9.9.9P1-63.25.1.x86_64", "SUSE OpenStack Cloud 8:bind-doc-9.9.9P1-63.25.1.noarch", "SUSE OpenStack Cloud 8:bind-libs-32bit-9.9.9P1-63.25.1.x86_64", "SUSE OpenStack Cloud 8:bind-libs-9.9.9P1-63.25.1.x86_64", "SUSE OpenStack Cloud 8:bind-utils-9.9.9P1-63.25.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:bind-9.9.9P1-63.25.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:bind-chrootenv-9.9.9P1-63.25.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:bind-doc-9.9.9P1-63.25.1.noarch", "SUSE OpenStack Cloud Crowbar 8:bind-libs-32bit-9.9.9P1-63.25.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:bind-libs-9.9.9P1-63.25.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:bind-utils-9.9.9P1-63.25.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-25214", url: "https://www.suse.com/security/cve/CVE-2021-25214", }, { category: "external", summary: "SUSE Bug 1185345 for CVE-2021-25214", url: "https://bugzilla.suse.com/1185345", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "HPE Helion OpenStack 8:bind-9.9.9P1-63.25.1.x86_64", "HPE Helion OpenStack 8:bind-chrootenv-9.9.9P1-63.25.1.x86_64", "HPE Helion OpenStack 8:bind-doc-9.9.9P1-63.25.1.noarch", "HPE Helion OpenStack 8:bind-libs-32bit-9.9.9P1-63.25.1.x86_64", "HPE Helion OpenStack 8:bind-libs-9.9.9P1-63.25.1.x86_64", "HPE Helion OpenStack 8:bind-utils-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:bind-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:bind-chrootenv-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:bind-doc-9.9.9P1-63.25.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:bind-libs-32bit-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:bind-libs-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:bind-utils-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:bind-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:bind-chrootenv-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:bind-doc-9.9.9P1-63.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:bind-libs-32bit-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:bind-libs-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:bind-utils-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-9.9.9P1-63.25.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-9.9.9P1-63.25.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-9.9.9P1-63.25.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-chrootenv-9.9.9P1-63.25.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-chrootenv-9.9.9P1-63.25.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-chrootenv-9.9.9P1-63.25.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-chrootenv-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-doc-9.9.9P1-63.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-libs-32bit-9.9.9P1-63.25.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-libs-32bit-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-libs-9.9.9P1-63.25.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-libs-9.9.9P1-63.25.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-libs-9.9.9P1-63.25.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-libs-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-utils-9.9.9P1-63.25.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-utils-9.9.9P1-63.25.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-utils-9.9.9P1-63.25.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-utils-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:bind-9.9.9P1-63.25.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:bind-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:bind-chrootenv-9.9.9P1-63.25.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:bind-chrootenv-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:bind-doc-9.9.9P1-63.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:bind-libs-32bit-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:bind-libs-9.9.9P1-63.25.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:bind-libs-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:bind-utils-9.9.9P1-63.25.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:bind-utils-9.9.9P1-63.25.1.x86_64", "SUSE OpenStack Cloud 8:bind-9.9.9P1-63.25.1.x86_64", "SUSE OpenStack Cloud 8:bind-chrootenv-9.9.9P1-63.25.1.x86_64", "SUSE OpenStack Cloud 8:bind-doc-9.9.9P1-63.25.1.noarch", "SUSE OpenStack Cloud 8:bind-libs-32bit-9.9.9P1-63.25.1.x86_64", "SUSE OpenStack Cloud 8:bind-libs-9.9.9P1-63.25.1.x86_64", "SUSE OpenStack Cloud 8:bind-utils-9.9.9P1-63.25.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:bind-9.9.9P1-63.25.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:bind-chrootenv-9.9.9P1-63.25.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:bind-doc-9.9.9P1-63.25.1.noarch", "SUSE OpenStack Cloud Crowbar 8:bind-libs-32bit-9.9.9P1-63.25.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:bind-libs-9.9.9P1-63.25.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:bind-utils-9.9.9P1-63.25.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "HPE Helion OpenStack 8:bind-9.9.9P1-63.25.1.x86_64", "HPE Helion OpenStack 8:bind-chrootenv-9.9.9P1-63.25.1.x86_64", "HPE Helion OpenStack 8:bind-doc-9.9.9P1-63.25.1.noarch", "HPE Helion OpenStack 8:bind-libs-32bit-9.9.9P1-63.25.1.x86_64", "HPE Helion OpenStack 8:bind-libs-9.9.9P1-63.25.1.x86_64", "HPE Helion OpenStack 8:bind-utils-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:bind-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:bind-chrootenv-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:bind-doc-9.9.9P1-63.25.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:bind-libs-32bit-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:bind-libs-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:bind-utils-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:bind-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:bind-chrootenv-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:bind-doc-9.9.9P1-63.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:bind-libs-32bit-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:bind-libs-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:bind-utils-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-9.9.9P1-63.25.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-9.9.9P1-63.25.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-9.9.9P1-63.25.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-chrootenv-9.9.9P1-63.25.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-chrootenv-9.9.9P1-63.25.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-chrootenv-9.9.9P1-63.25.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-chrootenv-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-doc-9.9.9P1-63.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-libs-32bit-9.9.9P1-63.25.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-libs-32bit-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-libs-9.9.9P1-63.25.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-libs-9.9.9P1-63.25.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-libs-9.9.9P1-63.25.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-libs-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-utils-9.9.9P1-63.25.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-utils-9.9.9P1-63.25.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-utils-9.9.9P1-63.25.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-utils-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:bind-9.9.9P1-63.25.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:bind-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:bind-chrootenv-9.9.9P1-63.25.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:bind-chrootenv-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:bind-doc-9.9.9P1-63.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:bind-libs-32bit-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:bind-libs-9.9.9P1-63.25.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:bind-libs-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:bind-utils-9.9.9P1-63.25.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:bind-utils-9.9.9P1-63.25.1.x86_64", "SUSE OpenStack Cloud 8:bind-9.9.9P1-63.25.1.x86_64", "SUSE OpenStack Cloud 8:bind-chrootenv-9.9.9P1-63.25.1.x86_64", "SUSE OpenStack Cloud 8:bind-doc-9.9.9P1-63.25.1.noarch", "SUSE OpenStack Cloud 8:bind-libs-32bit-9.9.9P1-63.25.1.x86_64", "SUSE OpenStack Cloud 8:bind-libs-9.9.9P1-63.25.1.x86_64", "SUSE OpenStack Cloud 8:bind-utils-9.9.9P1-63.25.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:bind-9.9.9P1-63.25.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:bind-chrootenv-9.9.9P1-63.25.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:bind-doc-9.9.9P1-63.25.1.noarch", "SUSE OpenStack Cloud Crowbar 8:bind-libs-32bit-9.9.9P1-63.25.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:bind-libs-9.9.9P1-63.25.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:bind-utils-9.9.9P1-63.25.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-05-04T06:34:07Z", details: "important", }, ], title: "CVE-2021-25214", }, { cve: "CVE-2021-25215", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-25215", }, ], notes: [ { category: "general", text: "In BIND 9.0.0 -> 9.11.29, 9.12.0 -> 9.16.13, and versions BIND 9.9.3-S1 -> 9.11.29-S1 and 9.16.8-S1 -> 9.16.13-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -> 9.17.11 of the BIND 9.17 development branch, when a vulnerable version of named receives a query for a record triggering the flaw described above, the named process will terminate due to a failed assertion check. The vulnerability affects all currently maintained BIND 9 branches (9.11, 9.11-S, 9.16, 9.16-S, 9.17) as well as all other versions of BIND 9.", title: "CVE description", }, ], product_status: { recommended: [ "HPE Helion OpenStack 8:bind-9.9.9P1-63.25.1.x86_64", "HPE Helion OpenStack 8:bind-chrootenv-9.9.9P1-63.25.1.x86_64", "HPE Helion OpenStack 8:bind-doc-9.9.9P1-63.25.1.noarch", "HPE Helion OpenStack 8:bind-libs-32bit-9.9.9P1-63.25.1.x86_64", "HPE Helion OpenStack 8:bind-libs-9.9.9P1-63.25.1.x86_64", "HPE Helion OpenStack 8:bind-utils-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:bind-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:bind-chrootenv-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:bind-doc-9.9.9P1-63.25.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:bind-libs-32bit-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:bind-libs-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:bind-utils-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:bind-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:bind-chrootenv-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:bind-doc-9.9.9P1-63.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:bind-libs-32bit-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:bind-libs-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:bind-utils-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-9.9.9P1-63.25.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-9.9.9P1-63.25.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-9.9.9P1-63.25.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-chrootenv-9.9.9P1-63.25.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-chrootenv-9.9.9P1-63.25.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-chrootenv-9.9.9P1-63.25.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-chrootenv-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-doc-9.9.9P1-63.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-libs-32bit-9.9.9P1-63.25.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-libs-32bit-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-libs-9.9.9P1-63.25.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-libs-9.9.9P1-63.25.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-libs-9.9.9P1-63.25.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-libs-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-utils-9.9.9P1-63.25.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-utils-9.9.9P1-63.25.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-utils-9.9.9P1-63.25.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-utils-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:bind-9.9.9P1-63.25.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:bind-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:bind-chrootenv-9.9.9P1-63.25.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:bind-chrootenv-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:bind-doc-9.9.9P1-63.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:bind-libs-32bit-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:bind-libs-9.9.9P1-63.25.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:bind-libs-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:bind-utils-9.9.9P1-63.25.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:bind-utils-9.9.9P1-63.25.1.x86_64", "SUSE OpenStack Cloud 8:bind-9.9.9P1-63.25.1.x86_64", "SUSE OpenStack Cloud 8:bind-chrootenv-9.9.9P1-63.25.1.x86_64", "SUSE OpenStack Cloud 8:bind-doc-9.9.9P1-63.25.1.noarch", "SUSE OpenStack Cloud 8:bind-libs-32bit-9.9.9P1-63.25.1.x86_64", "SUSE OpenStack Cloud 8:bind-libs-9.9.9P1-63.25.1.x86_64", "SUSE OpenStack Cloud 8:bind-utils-9.9.9P1-63.25.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:bind-9.9.9P1-63.25.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:bind-chrootenv-9.9.9P1-63.25.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:bind-doc-9.9.9P1-63.25.1.noarch", "SUSE OpenStack Cloud Crowbar 8:bind-libs-32bit-9.9.9P1-63.25.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:bind-libs-9.9.9P1-63.25.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:bind-utils-9.9.9P1-63.25.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-25215", url: "https://www.suse.com/security/cve/CVE-2021-25215", }, { category: "external", summary: "SUSE Bug 1185345 for CVE-2021-25215", url: "https://bugzilla.suse.com/1185345", }, { category: "external", summary: "SUSE Bug 1189848 for CVE-2021-25215", url: "https://bugzilla.suse.com/1189848", }, { category: "external", summary: "SUSE Bug 1196172 for CVE-2021-25215", url: "https://bugzilla.suse.com/1196172", }, { category: "external", summary: "SUSE Bug 1199298 for CVE-2021-25215", url: "https://bugzilla.suse.com/1199298", }, { category: "external", summary: "SUSE Bug 1225626 for CVE-2021-25215", url: "https://bugzilla.suse.com/1225626", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "HPE Helion OpenStack 8:bind-9.9.9P1-63.25.1.x86_64", "HPE Helion OpenStack 8:bind-chrootenv-9.9.9P1-63.25.1.x86_64", "HPE Helion OpenStack 8:bind-doc-9.9.9P1-63.25.1.noarch", "HPE Helion OpenStack 8:bind-libs-32bit-9.9.9P1-63.25.1.x86_64", "HPE Helion OpenStack 8:bind-libs-9.9.9P1-63.25.1.x86_64", "HPE Helion OpenStack 8:bind-utils-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:bind-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:bind-chrootenv-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:bind-doc-9.9.9P1-63.25.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:bind-libs-32bit-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:bind-libs-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:bind-utils-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:bind-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:bind-chrootenv-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:bind-doc-9.9.9P1-63.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:bind-libs-32bit-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:bind-libs-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:bind-utils-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-9.9.9P1-63.25.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-9.9.9P1-63.25.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-9.9.9P1-63.25.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-chrootenv-9.9.9P1-63.25.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-chrootenv-9.9.9P1-63.25.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-chrootenv-9.9.9P1-63.25.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-chrootenv-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-doc-9.9.9P1-63.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-libs-32bit-9.9.9P1-63.25.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-libs-32bit-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-libs-9.9.9P1-63.25.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-libs-9.9.9P1-63.25.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-libs-9.9.9P1-63.25.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-libs-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-utils-9.9.9P1-63.25.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-utils-9.9.9P1-63.25.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-utils-9.9.9P1-63.25.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-utils-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:bind-9.9.9P1-63.25.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:bind-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:bind-chrootenv-9.9.9P1-63.25.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:bind-chrootenv-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:bind-doc-9.9.9P1-63.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:bind-libs-32bit-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:bind-libs-9.9.9P1-63.25.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:bind-libs-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:bind-utils-9.9.9P1-63.25.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:bind-utils-9.9.9P1-63.25.1.x86_64", "SUSE OpenStack Cloud 8:bind-9.9.9P1-63.25.1.x86_64", "SUSE OpenStack Cloud 8:bind-chrootenv-9.9.9P1-63.25.1.x86_64", "SUSE OpenStack Cloud 8:bind-doc-9.9.9P1-63.25.1.noarch", "SUSE OpenStack Cloud 8:bind-libs-32bit-9.9.9P1-63.25.1.x86_64", "SUSE OpenStack Cloud 8:bind-libs-9.9.9P1-63.25.1.x86_64", "SUSE OpenStack Cloud 8:bind-utils-9.9.9P1-63.25.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:bind-9.9.9P1-63.25.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:bind-chrootenv-9.9.9P1-63.25.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:bind-doc-9.9.9P1-63.25.1.noarch", "SUSE OpenStack Cloud Crowbar 8:bind-libs-32bit-9.9.9P1-63.25.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:bind-libs-9.9.9P1-63.25.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:bind-utils-9.9.9P1-63.25.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "HPE Helion OpenStack 8:bind-9.9.9P1-63.25.1.x86_64", "HPE Helion OpenStack 8:bind-chrootenv-9.9.9P1-63.25.1.x86_64", "HPE Helion OpenStack 8:bind-doc-9.9.9P1-63.25.1.noarch", "HPE Helion OpenStack 8:bind-libs-32bit-9.9.9P1-63.25.1.x86_64", "HPE Helion OpenStack 8:bind-libs-9.9.9P1-63.25.1.x86_64", "HPE Helion OpenStack 8:bind-utils-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:bind-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:bind-chrootenv-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:bind-doc-9.9.9P1-63.25.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:bind-libs-32bit-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:bind-libs-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:bind-utils-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:bind-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:bind-chrootenv-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:bind-doc-9.9.9P1-63.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:bind-libs-32bit-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:bind-libs-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:bind-utils-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-9.9.9P1-63.25.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-9.9.9P1-63.25.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-9.9.9P1-63.25.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-chrootenv-9.9.9P1-63.25.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-chrootenv-9.9.9P1-63.25.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-chrootenv-9.9.9P1-63.25.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-chrootenv-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-doc-9.9.9P1-63.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-libs-32bit-9.9.9P1-63.25.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-libs-32bit-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-libs-9.9.9P1-63.25.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-libs-9.9.9P1-63.25.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-libs-9.9.9P1-63.25.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-libs-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-utils-9.9.9P1-63.25.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-utils-9.9.9P1-63.25.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-utils-9.9.9P1-63.25.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-utils-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:bind-9.9.9P1-63.25.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:bind-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:bind-chrootenv-9.9.9P1-63.25.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:bind-chrootenv-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:bind-doc-9.9.9P1-63.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:bind-libs-32bit-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:bind-libs-9.9.9P1-63.25.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:bind-libs-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:bind-utils-9.9.9P1-63.25.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:bind-utils-9.9.9P1-63.25.1.x86_64", "SUSE OpenStack Cloud 8:bind-9.9.9P1-63.25.1.x86_64", "SUSE OpenStack Cloud 8:bind-chrootenv-9.9.9P1-63.25.1.x86_64", "SUSE OpenStack Cloud 8:bind-doc-9.9.9P1-63.25.1.noarch", "SUSE OpenStack Cloud 8:bind-libs-32bit-9.9.9P1-63.25.1.x86_64", "SUSE OpenStack Cloud 8:bind-libs-9.9.9P1-63.25.1.x86_64", "SUSE OpenStack Cloud 8:bind-utils-9.9.9P1-63.25.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:bind-9.9.9P1-63.25.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:bind-chrootenv-9.9.9P1-63.25.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:bind-doc-9.9.9P1-63.25.1.noarch", "SUSE OpenStack Cloud Crowbar 8:bind-libs-32bit-9.9.9P1-63.25.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:bind-libs-9.9.9P1-63.25.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:bind-utils-9.9.9P1-63.25.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-05-04T06:34:07Z", details: "important", }, ], title: "CVE-2021-25215", }, { cve: "CVE-2021-25216", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-25216", }, ], notes: [ { category: "general", text: "In BIND 9.5.0 -> 9.11.29, 9.12.0 -> 9.16.13, and versions BIND 9.11.3-S1 -> 9.11.29-S1 and 9.16.8-S1 -> 9.16.13-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -> 9.17.1 of the BIND 9.17 development branch, BIND servers are vulnerable if they are running an affected version and are configured to use GSS-TSIG features. In a configuration which uses BIND's default settings the vulnerable code path is not exposed, but a server can be rendered vulnerable by explicitly setting values for the tkey-gssapi-keytab or tkey-gssapi-credential configuration options. Although the default configuration is not vulnerable, GSS-TSIG is frequently used in networks where BIND is integrated with Samba, as well as in mixed-server environments that combine BIND servers with Active Directory domain controllers. For servers that meet these conditions, the ISC SPNEGO implementation is vulnerable to various attacks, depending on the CPU architecture for which BIND was built: For named binaries compiled for 64-bit platforms, this flaw can be used to trigger a buffer over-read, leading to a server crash. For named binaries compiled for 32-bit platforms, this flaw can be used to trigger a server crash due to a buffer overflow and possibly also to achieve remote code execution. We have determined that standard SPNEGO implementations are available in the MIT and Heimdal Kerberos libraries, which support a broad range of operating systems, rendering the ISC implementation unnecessary and obsolete. Therefore, to reduce the attack surface for BIND users, we will be removing the ISC SPNEGO implementation in the April releases of BIND 9.11 and 9.16 (it had already been dropped from BIND 9.17). We would not normally remove something from a stable ESV (Extended Support Version) of BIND, but since system libraries can replace the ISC SPNEGO implementation, we have made an exception in this case for reasons of stability and security.", title: "CVE description", }, ], product_status: { recommended: [ "HPE Helion OpenStack 8:bind-9.9.9P1-63.25.1.x86_64", "HPE Helion OpenStack 8:bind-chrootenv-9.9.9P1-63.25.1.x86_64", "HPE Helion OpenStack 8:bind-doc-9.9.9P1-63.25.1.noarch", "HPE Helion OpenStack 8:bind-libs-32bit-9.9.9P1-63.25.1.x86_64", "HPE Helion OpenStack 8:bind-libs-9.9.9P1-63.25.1.x86_64", "HPE Helion OpenStack 8:bind-utils-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:bind-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:bind-chrootenv-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:bind-doc-9.9.9P1-63.25.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:bind-libs-32bit-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:bind-libs-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:bind-utils-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:bind-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:bind-chrootenv-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:bind-doc-9.9.9P1-63.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:bind-libs-32bit-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:bind-libs-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:bind-utils-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-9.9.9P1-63.25.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-9.9.9P1-63.25.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-9.9.9P1-63.25.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-chrootenv-9.9.9P1-63.25.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-chrootenv-9.9.9P1-63.25.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-chrootenv-9.9.9P1-63.25.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-chrootenv-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-doc-9.9.9P1-63.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-libs-32bit-9.9.9P1-63.25.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-libs-32bit-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-libs-9.9.9P1-63.25.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-libs-9.9.9P1-63.25.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-libs-9.9.9P1-63.25.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-libs-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-utils-9.9.9P1-63.25.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-utils-9.9.9P1-63.25.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-utils-9.9.9P1-63.25.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-utils-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:bind-9.9.9P1-63.25.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:bind-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:bind-chrootenv-9.9.9P1-63.25.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:bind-chrootenv-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:bind-doc-9.9.9P1-63.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:bind-libs-32bit-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:bind-libs-9.9.9P1-63.25.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:bind-libs-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:bind-utils-9.9.9P1-63.25.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:bind-utils-9.9.9P1-63.25.1.x86_64", "SUSE OpenStack Cloud 8:bind-9.9.9P1-63.25.1.x86_64", "SUSE OpenStack Cloud 8:bind-chrootenv-9.9.9P1-63.25.1.x86_64", "SUSE OpenStack Cloud 8:bind-doc-9.9.9P1-63.25.1.noarch", "SUSE OpenStack Cloud 8:bind-libs-32bit-9.9.9P1-63.25.1.x86_64", "SUSE OpenStack Cloud 8:bind-libs-9.9.9P1-63.25.1.x86_64", "SUSE OpenStack Cloud 8:bind-utils-9.9.9P1-63.25.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:bind-9.9.9P1-63.25.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:bind-chrootenv-9.9.9P1-63.25.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:bind-doc-9.9.9P1-63.25.1.noarch", "SUSE OpenStack Cloud Crowbar 8:bind-libs-32bit-9.9.9P1-63.25.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:bind-libs-9.9.9P1-63.25.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:bind-utils-9.9.9P1-63.25.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-25216", url: "https://www.suse.com/security/cve/CVE-2021-25216", }, { category: "external", summary: "SUSE Bug 1185345 for CVE-2021-25216", url: "https://bugzilla.suse.com/1185345", }, { category: "external", summary: "SUSE Bug 1189848 for CVE-2021-25216", url: "https://bugzilla.suse.com/1189848", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "HPE Helion OpenStack 8:bind-9.9.9P1-63.25.1.x86_64", "HPE Helion OpenStack 8:bind-chrootenv-9.9.9P1-63.25.1.x86_64", "HPE Helion OpenStack 8:bind-doc-9.9.9P1-63.25.1.noarch", "HPE Helion OpenStack 8:bind-libs-32bit-9.9.9P1-63.25.1.x86_64", "HPE Helion OpenStack 8:bind-libs-9.9.9P1-63.25.1.x86_64", "HPE Helion OpenStack 8:bind-utils-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:bind-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:bind-chrootenv-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:bind-doc-9.9.9P1-63.25.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:bind-libs-32bit-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:bind-libs-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:bind-utils-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:bind-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:bind-chrootenv-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:bind-doc-9.9.9P1-63.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:bind-libs-32bit-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:bind-libs-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:bind-utils-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-9.9.9P1-63.25.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-9.9.9P1-63.25.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-9.9.9P1-63.25.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-chrootenv-9.9.9P1-63.25.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-chrootenv-9.9.9P1-63.25.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-chrootenv-9.9.9P1-63.25.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-chrootenv-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-doc-9.9.9P1-63.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-libs-32bit-9.9.9P1-63.25.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-libs-32bit-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-libs-9.9.9P1-63.25.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-libs-9.9.9P1-63.25.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-libs-9.9.9P1-63.25.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-libs-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-utils-9.9.9P1-63.25.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-utils-9.9.9P1-63.25.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-utils-9.9.9P1-63.25.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-utils-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:bind-9.9.9P1-63.25.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:bind-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:bind-chrootenv-9.9.9P1-63.25.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:bind-chrootenv-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:bind-doc-9.9.9P1-63.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:bind-libs-32bit-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:bind-libs-9.9.9P1-63.25.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:bind-libs-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:bind-utils-9.9.9P1-63.25.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:bind-utils-9.9.9P1-63.25.1.x86_64", "SUSE OpenStack Cloud 8:bind-9.9.9P1-63.25.1.x86_64", "SUSE OpenStack Cloud 8:bind-chrootenv-9.9.9P1-63.25.1.x86_64", "SUSE OpenStack Cloud 8:bind-doc-9.9.9P1-63.25.1.noarch", "SUSE OpenStack Cloud 8:bind-libs-32bit-9.9.9P1-63.25.1.x86_64", "SUSE OpenStack Cloud 8:bind-libs-9.9.9P1-63.25.1.x86_64", "SUSE OpenStack Cloud 8:bind-utils-9.9.9P1-63.25.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:bind-9.9.9P1-63.25.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:bind-chrootenv-9.9.9P1-63.25.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:bind-doc-9.9.9P1-63.25.1.noarch", "SUSE OpenStack Cloud Crowbar 8:bind-libs-32bit-9.9.9P1-63.25.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:bind-libs-9.9.9P1-63.25.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:bind-utils-9.9.9P1-63.25.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "HPE Helion OpenStack 8:bind-9.9.9P1-63.25.1.x86_64", "HPE Helion OpenStack 8:bind-chrootenv-9.9.9P1-63.25.1.x86_64", "HPE Helion OpenStack 8:bind-doc-9.9.9P1-63.25.1.noarch", "HPE Helion OpenStack 8:bind-libs-32bit-9.9.9P1-63.25.1.x86_64", "HPE Helion OpenStack 8:bind-libs-9.9.9P1-63.25.1.x86_64", "HPE Helion OpenStack 8:bind-utils-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:bind-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:bind-chrootenv-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:bind-doc-9.9.9P1-63.25.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:bind-libs-32bit-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:bind-libs-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:bind-utils-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:bind-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:bind-chrootenv-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:bind-doc-9.9.9P1-63.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:bind-libs-32bit-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:bind-libs-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:bind-utils-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-9.9.9P1-63.25.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-9.9.9P1-63.25.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-9.9.9P1-63.25.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-chrootenv-9.9.9P1-63.25.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-chrootenv-9.9.9P1-63.25.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-chrootenv-9.9.9P1-63.25.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-chrootenv-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-doc-9.9.9P1-63.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-libs-32bit-9.9.9P1-63.25.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-libs-32bit-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-libs-9.9.9P1-63.25.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-libs-9.9.9P1-63.25.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-libs-9.9.9P1-63.25.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-libs-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-utils-9.9.9P1-63.25.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-utils-9.9.9P1-63.25.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-utils-9.9.9P1-63.25.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:bind-utils-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:bind-9.9.9P1-63.25.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:bind-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:bind-chrootenv-9.9.9P1-63.25.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:bind-chrootenv-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:bind-doc-9.9.9P1-63.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:bind-libs-32bit-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:bind-libs-9.9.9P1-63.25.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:bind-libs-9.9.9P1-63.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:bind-utils-9.9.9P1-63.25.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:bind-utils-9.9.9P1-63.25.1.x86_64", "SUSE OpenStack Cloud 8:bind-9.9.9P1-63.25.1.x86_64", "SUSE OpenStack Cloud 8:bind-chrootenv-9.9.9P1-63.25.1.x86_64", "SUSE OpenStack Cloud 8:bind-doc-9.9.9P1-63.25.1.noarch", "SUSE OpenStack Cloud 8:bind-libs-32bit-9.9.9P1-63.25.1.x86_64", "SUSE OpenStack Cloud 8:bind-libs-9.9.9P1-63.25.1.x86_64", "SUSE OpenStack Cloud 8:bind-utils-9.9.9P1-63.25.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:bind-9.9.9P1-63.25.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:bind-chrootenv-9.9.9P1-63.25.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:bind-doc-9.9.9P1-63.25.1.noarch", "SUSE OpenStack Cloud Crowbar 8:bind-libs-32bit-9.9.9P1-63.25.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:bind-libs-9.9.9P1-63.25.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:bind-utils-9.9.9P1-63.25.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-05-04T06:34:07Z", details: "important", }, ], title: "CVE-2021-25216", }, ], }
suse-su-2021:14714-1
Vulnerability from csaf_suse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for bind", title: "Title of the patch", }, { category: "description", text: "This update for bind fixes the following issues:\n\n- CVE-2021-25214: Fixed a broken inbound incremental zone update (IXFR) which could have caused named to terminate unexpectedly (bsc#1185345).\n- CVE-2021-25215: Fixed an assertion check which could have failed while answering queries for DNAME records that required the DNAME to be processed to resolve itself (bsc#1185345).\n- CVE-2021-25216: Fixed an issue where policy negotiation can be targeted by a buffer overflow attack (bsc#1185345).\n", title: "Description of the patch", }, { category: "details", text: "sleposp3-bind-14714,slessp4-bind-14714", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_14714-1.json", }, { category: "self", summary: "URL for SUSE-SU-2021:14714-1", url: "https://www.suse.com/support/update/announcement/2021/suse-su-202114714-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2021:14714-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2021-May/008726.html", }, { category: "self", summary: "SUSE Bug 1185345", url: "https://bugzilla.suse.com/1185345", }, { category: "self", summary: "SUSE CVE CVE-2021-25214 page", url: "https://www.suse.com/security/cve/CVE-2021-25214/", }, { category: "self", summary: "SUSE CVE CVE-2021-25215 page", url: "https://www.suse.com/security/cve/CVE-2021-25215/", }, { category: "self", summary: "SUSE CVE CVE-2021-25216 page", url: "https://www.suse.com/security/cve/CVE-2021-25216/", }, ], title: "Security update for bind", tracking: { current_release_date: "2021-05-04T06:34:54Z", generator: { date: "2021-05-04T06:34:54Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2021:14714-1", initial_release_date: "2021-05-04T06:34:54Z", revision_history: [ { date: "2021-05-04T06:34:54Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "bind-9.9.6P1-0.51.26.1.i586", product: { name: "bind-9.9.6P1-0.51.26.1.i586", product_id: "bind-9.9.6P1-0.51.26.1.i586", }, }, { category: "product_version", name: "bind-chrootenv-9.9.6P1-0.51.26.1.i586", product: { name: "bind-chrootenv-9.9.6P1-0.51.26.1.i586", product_id: "bind-chrootenv-9.9.6P1-0.51.26.1.i586", }, }, { category: "product_version", name: "bind-devel-9.9.6P1-0.51.26.1.i586", product: { name: "bind-devel-9.9.6P1-0.51.26.1.i586", product_id: "bind-devel-9.9.6P1-0.51.26.1.i586", }, }, { category: "product_version", name: "bind-doc-9.9.6P1-0.51.26.1.i586", product: { name: "bind-doc-9.9.6P1-0.51.26.1.i586", product_id: "bind-doc-9.9.6P1-0.51.26.1.i586", }, }, { category: "product_version", name: "bind-libs-9.9.6P1-0.51.26.1.i586", product: { name: "bind-libs-9.9.6P1-0.51.26.1.i586", product_id: "bind-libs-9.9.6P1-0.51.26.1.i586", }, }, { category: "product_version", name: "bind-utils-9.9.6P1-0.51.26.1.i586", product: { name: "bind-utils-9.9.6P1-0.51.26.1.i586", product_id: "bind-utils-9.9.6P1-0.51.26.1.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "bind-9.9.6P1-0.51.26.1.ppc64", product: { name: "bind-9.9.6P1-0.51.26.1.ppc64", product_id: "bind-9.9.6P1-0.51.26.1.ppc64", }, }, { category: "product_version", name: "bind-chrootenv-9.9.6P1-0.51.26.1.ppc64", product: { name: "bind-chrootenv-9.9.6P1-0.51.26.1.ppc64", product_id: "bind-chrootenv-9.9.6P1-0.51.26.1.ppc64", }, }, { category: "product_version", name: "bind-doc-9.9.6P1-0.51.26.1.ppc64", product: { name: "bind-doc-9.9.6P1-0.51.26.1.ppc64", product_id: "bind-doc-9.9.6P1-0.51.26.1.ppc64", }, }, { category: "product_version", name: "bind-libs-9.9.6P1-0.51.26.1.ppc64", product: { name: "bind-libs-9.9.6P1-0.51.26.1.ppc64", product_id: "bind-libs-9.9.6P1-0.51.26.1.ppc64", }, }, { category: "product_version", name: "bind-libs-32bit-9.9.6P1-0.51.26.1.ppc64", product: { name: "bind-libs-32bit-9.9.6P1-0.51.26.1.ppc64", product_id: "bind-libs-32bit-9.9.6P1-0.51.26.1.ppc64", }, }, { category: "product_version", name: "bind-utils-9.9.6P1-0.51.26.1.ppc64", product: { name: "bind-utils-9.9.6P1-0.51.26.1.ppc64", product_id: "bind-utils-9.9.6P1-0.51.26.1.ppc64", }, }, ], category: "architecture", name: "ppc64", }, { branches: [ { category: "product_version", name: "bind-9.9.6P1-0.51.26.1.s390x", product: { name: "bind-9.9.6P1-0.51.26.1.s390x", product_id: "bind-9.9.6P1-0.51.26.1.s390x", }, }, { category: "product_version", name: "bind-chrootenv-9.9.6P1-0.51.26.1.s390x", product: { name: "bind-chrootenv-9.9.6P1-0.51.26.1.s390x", product_id: "bind-chrootenv-9.9.6P1-0.51.26.1.s390x", }, }, { category: "product_version", name: "bind-doc-9.9.6P1-0.51.26.1.s390x", product: { name: "bind-doc-9.9.6P1-0.51.26.1.s390x", product_id: "bind-doc-9.9.6P1-0.51.26.1.s390x", }, }, { category: "product_version", name: "bind-libs-9.9.6P1-0.51.26.1.s390x", product: { name: "bind-libs-9.9.6P1-0.51.26.1.s390x", product_id: "bind-libs-9.9.6P1-0.51.26.1.s390x", }, }, { category: "product_version", name: "bind-libs-32bit-9.9.6P1-0.51.26.1.s390x", product: { name: "bind-libs-32bit-9.9.6P1-0.51.26.1.s390x", product_id: "bind-libs-32bit-9.9.6P1-0.51.26.1.s390x", }, }, { category: "product_version", name: "bind-utils-9.9.6P1-0.51.26.1.s390x", product: { name: "bind-utils-9.9.6P1-0.51.26.1.s390x", product_id: "bind-utils-9.9.6P1-0.51.26.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "bind-9.9.6P1-0.51.26.1.x86_64", product: { name: "bind-9.9.6P1-0.51.26.1.x86_64", product_id: "bind-9.9.6P1-0.51.26.1.x86_64", }, }, { category: "product_version", name: "bind-chrootenv-9.9.6P1-0.51.26.1.x86_64", product: { name: "bind-chrootenv-9.9.6P1-0.51.26.1.x86_64", product_id: "bind-chrootenv-9.9.6P1-0.51.26.1.x86_64", }, }, { category: "product_version", name: "bind-doc-9.9.6P1-0.51.26.1.x86_64", product: { name: "bind-doc-9.9.6P1-0.51.26.1.x86_64", product_id: "bind-doc-9.9.6P1-0.51.26.1.x86_64", }, }, { category: "product_version", name: "bind-libs-9.9.6P1-0.51.26.1.x86_64", product: { name: "bind-libs-9.9.6P1-0.51.26.1.x86_64", product_id: "bind-libs-9.9.6P1-0.51.26.1.x86_64", }, }, { category: "product_version", name: "bind-libs-32bit-9.9.6P1-0.51.26.1.x86_64", product: { name: "bind-libs-32bit-9.9.6P1-0.51.26.1.x86_64", product_id: "bind-libs-32bit-9.9.6P1-0.51.26.1.x86_64", }, }, { category: "product_version", name: "bind-utils-9.9.6P1-0.51.26.1.x86_64", product: { name: "bind-utils-9.9.6P1-0.51.26.1.x86_64", product_id: "bind-utils-9.9.6P1-0.51.26.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Point of Sale 11 SP3", product: { name: "SUSE Linux Enterprise Point of Sale 11 SP3", product_id: "SUSE Linux Enterprise Point of Sale 11 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sle-pos:11:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 11 SP4-LTSS", product: { name: "SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:suse_sles:11:sp4", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "bind-9.9.6P1-0.51.26.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", product_id: "SUSE Linux Enterprise Point of Sale 11 SP3:bind-9.9.6P1-0.51.26.1.i586", }, product_reference: "bind-9.9.6P1-0.51.26.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Point of Sale 11 SP3", }, { category: "default_component_of", full_product_name: { name: "bind-chrootenv-9.9.6P1-0.51.26.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", product_id: "SUSE Linux Enterprise Point of Sale 11 SP3:bind-chrootenv-9.9.6P1-0.51.26.1.i586", }, product_reference: "bind-chrootenv-9.9.6P1-0.51.26.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Point of Sale 11 SP3", }, { category: "default_component_of", full_product_name: { name: "bind-devel-9.9.6P1-0.51.26.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", product_id: "SUSE Linux Enterprise Point of Sale 11 SP3:bind-devel-9.9.6P1-0.51.26.1.i586", }, product_reference: "bind-devel-9.9.6P1-0.51.26.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Point of Sale 11 SP3", }, { category: "default_component_of", full_product_name: { name: "bind-doc-9.9.6P1-0.51.26.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", product_id: "SUSE Linux Enterprise Point of Sale 11 SP3:bind-doc-9.9.6P1-0.51.26.1.i586", }, product_reference: "bind-doc-9.9.6P1-0.51.26.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Point of Sale 11 SP3", }, { category: "default_component_of", full_product_name: { name: "bind-libs-9.9.6P1-0.51.26.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", product_id: "SUSE Linux Enterprise Point of Sale 11 SP3:bind-libs-9.9.6P1-0.51.26.1.i586", }, product_reference: "bind-libs-9.9.6P1-0.51.26.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Point of Sale 11 SP3", }, { category: "default_component_of", full_product_name: { name: "bind-utils-9.9.6P1-0.51.26.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", product_id: "SUSE Linux Enterprise Point of Sale 11 SP3:bind-utils-9.9.6P1-0.51.26.1.i586", }, product_reference: "bind-utils-9.9.6P1-0.51.26.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Point of Sale 11 SP3", }, { category: "default_component_of", full_product_name: { name: "bind-9.9.6P1-0.51.26.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-9.9.6P1-0.51.26.1.i586", }, product_reference: "bind-9.9.6P1-0.51.26.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "bind-9.9.6P1-0.51.26.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-9.9.6P1-0.51.26.1.ppc64", }, product_reference: "bind-9.9.6P1-0.51.26.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "bind-9.9.6P1-0.51.26.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-9.9.6P1-0.51.26.1.s390x", }, product_reference: "bind-9.9.6P1-0.51.26.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "bind-9.9.6P1-0.51.26.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-9.9.6P1-0.51.26.1.x86_64", }, product_reference: "bind-9.9.6P1-0.51.26.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "bind-chrootenv-9.9.6P1-0.51.26.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-chrootenv-9.9.6P1-0.51.26.1.i586", }, product_reference: "bind-chrootenv-9.9.6P1-0.51.26.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "bind-chrootenv-9.9.6P1-0.51.26.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-chrootenv-9.9.6P1-0.51.26.1.ppc64", }, product_reference: "bind-chrootenv-9.9.6P1-0.51.26.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "bind-chrootenv-9.9.6P1-0.51.26.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-chrootenv-9.9.6P1-0.51.26.1.s390x", }, product_reference: "bind-chrootenv-9.9.6P1-0.51.26.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "bind-chrootenv-9.9.6P1-0.51.26.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-chrootenv-9.9.6P1-0.51.26.1.x86_64", }, product_reference: "bind-chrootenv-9.9.6P1-0.51.26.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "bind-doc-9.9.6P1-0.51.26.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-doc-9.9.6P1-0.51.26.1.i586", }, product_reference: "bind-doc-9.9.6P1-0.51.26.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "bind-doc-9.9.6P1-0.51.26.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-doc-9.9.6P1-0.51.26.1.ppc64", }, product_reference: "bind-doc-9.9.6P1-0.51.26.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "bind-doc-9.9.6P1-0.51.26.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-doc-9.9.6P1-0.51.26.1.s390x", }, product_reference: "bind-doc-9.9.6P1-0.51.26.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "bind-doc-9.9.6P1-0.51.26.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-doc-9.9.6P1-0.51.26.1.x86_64", }, product_reference: "bind-doc-9.9.6P1-0.51.26.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "bind-libs-9.9.6P1-0.51.26.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-libs-9.9.6P1-0.51.26.1.i586", }, product_reference: "bind-libs-9.9.6P1-0.51.26.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "bind-libs-9.9.6P1-0.51.26.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-libs-9.9.6P1-0.51.26.1.ppc64", }, product_reference: "bind-libs-9.9.6P1-0.51.26.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "bind-libs-9.9.6P1-0.51.26.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-libs-9.9.6P1-0.51.26.1.s390x", }, product_reference: "bind-libs-9.9.6P1-0.51.26.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "bind-libs-9.9.6P1-0.51.26.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-libs-9.9.6P1-0.51.26.1.x86_64", }, product_reference: "bind-libs-9.9.6P1-0.51.26.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "bind-libs-32bit-9.9.6P1-0.51.26.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-libs-32bit-9.9.6P1-0.51.26.1.ppc64", }, product_reference: "bind-libs-32bit-9.9.6P1-0.51.26.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "bind-libs-32bit-9.9.6P1-0.51.26.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-libs-32bit-9.9.6P1-0.51.26.1.s390x", }, product_reference: "bind-libs-32bit-9.9.6P1-0.51.26.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "bind-libs-32bit-9.9.6P1-0.51.26.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-libs-32bit-9.9.6P1-0.51.26.1.x86_64", }, product_reference: "bind-libs-32bit-9.9.6P1-0.51.26.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "bind-utils-9.9.6P1-0.51.26.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-utils-9.9.6P1-0.51.26.1.i586", }, product_reference: "bind-utils-9.9.6P1-0.51.26.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "bind-utils-9.9.6P1-0.51.26.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-utils-9.9.6P1-0.51.26.1.ppc64", }, product_reference: "bind-utils-9.9.6P1-0.51.26.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "bind-utils-9.9.6P1-0.51.26.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-utils-9.9.6P1-0.51.26.1.s390x", }, product_reference: "bind-utils-9.9.6P1-0.51.26.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "bind-utils-9.9.6P1-0.51.26.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-utils-9.9.6P1-0.51.26.1.x86_64", }, product_reference: "bind-utils-9.9.6P1-0.51.26.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, ], }, vulnerabilities: [ { cve: "CVE-2021-25214", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-25214", }, ], notes: [ { category: "general", text: "In BIND 9.8.5 -> 9.8.8, 9.9.3 -> 9.11.29, 9.12.0 -> 9.16.13, and versions BIND 9.9.3-S1 -> 9.11.29-S1 and 9.16.8-S1 -> 9.16.13-S1 of BIND 9 Supported Preview Edition, as well as release versions 9.17.0 -> 9.17.11 of the BIND 9.17 development branch, when a vulnerable version of named receives a malformed IXFR triggering the flaw described above, the named process will terminate due to a failed assertion the next time the transferred secondary zone is refreshed.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Point of Sale 11 SP3:bind-9.9.6P1-0.51.26.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:bind-chrootenv-9.9.6P1-0.51.26.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:bind-devel-9.9.6P1-0.51.26.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:bind-doc-9.9.6P1-0.51.26.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:bind-libs-9.9.6P1-0.51.26.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:bind-utils-9.9.6P1-0.51.26.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-9.9.6P1-0.51.26.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-9.9.6P1-0.51.26.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-9.9.6P1-0.51.26.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-9.9.6P1-0.51.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-chrootenv-9.9.6P1-0.51.26.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-chrootenv-9.9.6P1-0.51.26.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-chrootenv-9.9.6P1-0.51.26.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-chrootenv-9.9.6P1-0.51.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-doc-9.9.6P1-0.51.26.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-doc-9.9.6P1-0.51.26.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-doc-9.9.6P1-0.51.26.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-doc-9.9.6P1-0.51.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-libs-32bit-9.9.6P1-0.51.26.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-libs-32bit-9.9.6P1-0.51.26.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-libs-32bit-9.9.6P1-0.51.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-libs-9.9.6P1-0.51.26.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-libs-9.9.6P1-0.51.26.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-libs-9.9.6P1-0.51.26.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-libs-9.9.6P1-0.51.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-utils-9.9.6P1-0.51.26.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-utils-9.9.6P1-0.51.26.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-utils-9.9.6P1-0.51.26.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-utils-9.9.6P1-0.51.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-25214", url: "https://www.suse.com/security/cve/CVE-2021-25214", }, { category: "external", summary: "SUSE Bug 1185345 for CVE-2021-25214", url: "https://bugzilla.suse.com/1185345", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Point of Sale 11 SP3:bind-9.9.6P1-0.51.26.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:bind-chrootenv-9.9.6P1-0.51.26.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:bind-devel-9.9.6P1-0.51.26.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:bind-doc-9.9.6P1-0.51.26.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:bind-libs-9.9.6P1-0.51.26.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:bind-utils-9.9.6P1-0.51.26.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-9.9.6P1-0.51.26.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-9.9.6P1-0.51.26.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-9.9.6P1-0.51.26.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-9.9.6P1-0.51.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-chrootenv-9.9.6P1-0.51.26.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-chrootenv-9.9.6P1-0.51.26.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-chrootenv-9.9.6P1-0.51.26.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-chrootenv-9.9.6P1-0.51.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-doc-9.9.6P1-0.51.26.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-doc-9.9.6P1-0.51.26.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-doc-9.9.6P1-0.51.26.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-doc-9.9.6P1-0.51.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-libs-32bit-9.9.6P1-0.51.26.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-libs-32bit-9.9.6P1-0.51.26.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-libs-32bit-9.9.6P1-0.51.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-libs-9.9.6P1-0.51.26.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-libs-9.9.6P1-0.51.26.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-libs-9.9.6P1-0.51.26.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-libs-9.9.6P1-0.51.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-utils-9.9.6P1-0.51.26.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-utils-9.9.6P1-0.51.26.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-utils-9.9.6P1-0.51.26.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-utils-9.9.6P1-0.51.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Point of Sale 11 SP3:bind-9.9.6P1-0.51.26.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:bind-chrootenv-9.9.6P1-0.51.26.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:bind-devel-9.9.6P1-0.51.26.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:bind-doc-9.9.6P1-0.51.26.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:bind-libs-9.9.6P1-0.51.26.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:bind-utils-9.9.6P1-0.51.26.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-9.9.6P1-0.51.26.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-9.9.6P1-0.51.26.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-9.9.6P1-0.51.26.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-9.9.6P1-0.51.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-chrootenv-9.9.6P1-0.51.26.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-chrootenv-9.9.6P1-0.51.26.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-chrootenv-9.9.6P1-0.51.26.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-chrootenv-9.9.6P1-0.51.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-doc-9.9.6P1-0.51.26.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-doc-9.9.6P1-0.51.26.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-doc-9.9.6P1-0.51.26.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-doc-9.9.6P1-0.51.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-libs-32bit-9.9.6P1-0.51.26.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-libs-32bit-9.9.6P1-0.51.26.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-libs-32bit-9.9.6P1-0.51.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-libs-9.9.6P1-0.51.26.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-libs-9.9.6P1-0.51.26.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-libs-9.9.6P1-0.51.26.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-libs-9.9.6P1-0.51.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-utils-9.9.6P1-0.51.26.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-utils-9.9.6P1-0.51.26.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-utils-9.9.6P1-0.51.26.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-utils-9.9.6P1-0.51.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-05-04T06:34:54Z", details: "important", }, ], title: "CVE-2021-25214", }, { cve: "CVE-2021-25215", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-25215", }, ], notes: [ { category: "general", text: "In BIND 9.0.0 -> 9.11.29, 9.12.0 -> 9.16.13, and versions BIND 9.9.3-S1 -> 9.11.29-S1 and 9.16.8-S1 -> 9.16.13-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -> 9.17.11 of the BIND 9.17 development branch, when a vulnerable version of named receives a query for a record triggering the flaw described above, the named process will terminate due to a failed assertion check. The vulnerability affects all currently maintained BIND 9 branches (9.11, 9.11-S, 9.16, 9.16-S, 9.17) as well as all other versions of BIND 9.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Point of Sale 11 SP3:bind-9.9.6P1-0.51.26.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:bind-chrootenv-9.9.6P1-0.51.26.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:bind-devel-9.9.6P1-0.51.26.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:bind-doc-9.9.6P1-0.51.26.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:bind-libs-9.9.6P1-0.51.26.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:bind-utils-9.9.6P1-0.51.26.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-9.9.6P1-0.51.26.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-9.9.6P1-0.51.26.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-9.9.6P1-0.51.26.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-9.9.6P1-0.51.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-chrootenv-9.9.6P1-0.51.26.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-chrootenv-9.9.6P1-0.51.26.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-chrootenv-9.9.6P1-0.51.26.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-chrootenv-9.9.6P1-0.51.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-doc-9.9.6P1-0.51.26.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-doc-9.9.6P1-0.51.26.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-doc-9.9.6P1-0.51.26.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-doc-9.9.6P1-0.51.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-libs-32bit-9.9.6P1-0.51.26.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-libs-32bit-9.9.6P1-0.51.26.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-libs-32bit-9.9.6P1-0.51.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-libs-9.9.6P1-0.51.26.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-libs-9.9.6P1-0.51.26.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-libs-9.9.6P1-0.51.26.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-libs-9.9.6P1-0.51.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-utils-9.9.6P1-0.51.26.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-utils-9.9.6P1-0.51.26.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-utils-9.9.6P1-0.51.26.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-utils-9.9.6P1-0.51.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-25215", url: "https://www.suse.com/security/cve/CVE-2021-25215", }, { category: "external", summary: "SUSE Bug 1185345 for CVE-2021-25215", url: "https://bugzilla.suse.com/1185345", }, { category: "external", summary: "SUSE Bug 1189848 for CVE-2021-25215", url: "https://bugzilla.suse.com/1189848", }, { category: "external", summary: "SUSE Bug 1196172 for CVE-2021-25215", url: "https://bugzilla.suse.com/1196172", }, { category: "external", summary: "SUSE Bug 1199298 for CVE-2021-25215", url: "https://bugzilla.suse.com/1199298", }, { category: "external", summary: "SUSE Bug 1225626 for CVE-2021-25215", url: "https://bugzilla.suse.com/1225626", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Point of Sale 11 SP3:bind-9.9.6P1-0.51.26.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:bind-chrootenv-9.9.6P1-0.51.26.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:bind-devel-9.9.6P1-0.51.26.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:bind-doc-9.9.6P1-0.51.26.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:bind-libs-9.9.6P1-0.51.26.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:bind-utils-9.9.6P1-0.51.26.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-9.9.6P1-0.51.26.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-9.9.6P1-0.51.26.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-9.9.6P1-0.51.26.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-9.9.6P1-0.51.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-chrootenv-9.9.6P1-0.51.26.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-chrootenv-9.9.6P1-0.51.26.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-chrootenv-9.9.6P1-0.51.26.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-chrootenv-9.9.6P1-0.51.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-doc-9.9.6P1-0.51.26.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-doc-9.9.6P1-0.51.26.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-doc-9.9.6P1-0.51.26.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-doc-9.9.6P1-0.51.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-libs-32bit-9.9.6P1-0.51.26.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-libs-32bit-9.9.6P1-0.51.26.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-libs-32bit-9.9.6P1-0.51.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-libs-9.9.6P1-0.51.26.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-libs-9.9.6P1-0.51.26.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-libs-9.9.6P1-0.51.26.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-libs-9.9.6P1-0.51.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-utils-9.9.6P1-0.51.26.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-utils-9.9.6P1-0.51.26.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-utils-9.9.6P1-0.51.26.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-utils-9.9.6P1-0.51.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Point of Sale 11 SP3:bind-9.9.6P1-0.51.26.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:bind-chrootenv-9.9.6P1-0.51.26.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:bind-devel-9.9.6P1-0.51.26.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:bind-doc-9.9.6P1-0.51.26.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:bind-libs-9.9.6P1-0.51.26.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:bind-utils-9.9.6P1-0.51.26.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-9.9.6P1-0.51.26.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-9.9.6P1-0.51.26.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-9.9.6P1-0.51.26.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-9.9.6P1-0.51.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-chrootenv-9.9.6P1-0.51.26.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-chrootenv-9.9.6P1-0.51.26.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-chrootenv-9.9.6P1-0.51.26.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-chrootenv-9.9.6P1-0.51.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-doc-9.9.6P1-0.51.26.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-doc-9.9.6P1-0.51.26.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-doc-9.9.6P1-0.51.26.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-doc-9.9.6P1-0.51.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-libs-32bit-9.9.6P1-0.51.26.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-libs-32bit-9.9.6P1-0.51.26.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-libs-32bit-9.9.6P1-0.51.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-libs-9.9.6P1-0.51.26.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-libs-9.9.6P1-0.51.26.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-libs-9.9.6P1-0.51.26.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-libs-9.9.6P1-0.51.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-utils-9.9.6P1-0.51.26.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-utils-9.9.6P1-0.51.26.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-utils-9.9.6P1-0.51.26.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-utils-9.9.6P1-0.51.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-05-04T06:34:54Z", details: "important", }, ], title: "CVE-2021-25215", }, { cve: "CVE-2021-25216", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-25216", }, ], notes: [ { category: "general", text: "In BIND 9.5.0 -> 9.11.29, 9.12.0 -> 9.16.13, and versions BIND 9.11.3-S1 -> 9.11.29-S1 and 9.16.8-S1 -> 9.16.13-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -> 9.17.1 of the BIND 9.17 development branch, BIND servers are vulnerable if they are running an affected version and are configured to use GSS-TSIG features. In a configuration which uses BIND's default settings the vulnerable code path is not exposed, but a server can be rendered vulnerable by explicitly setting values for the tkey-gssapi-keytab or tkey-gssapi-credential configuration options. Although the default configuration is not vulnerable, GSS-TSIG is frequently used in networks where BIND is integrated with Samba, as well as in mixed-server environments that combine BIND servers with Active Directory domain controllers. For servers that meet these conditions, the ISC SPNEGO implementation is vulnerable to various attacks, depending on the CPU architecture for which BIND was built: For named binaries compiled for 64-bit platforms, this flaw can be used to trigger a buffer over-read, leading to a server crash. For named binaries compiled for 32-bit platforms, this flaw can be used to trigger a server crash due to a buffer overflow and possibly also to achieve remote code execution. We have determined that standard SPNEGO implementations are available in the MIT and Heimdal Kerberos libraries, which support a broad range of operating systems, rendering the ISC implementation unnecessary and obsolete. Therefore, to reduce the attack surface for BIND users, we will be removing the ISC SPNEGO implementation in the April releases of BIND 9.11 and 9.16 (it had already been dropped from BIND 9.17). We would not normally remove something from a stable ESV (Extended Support Version) of BIND, but since system libraries can replace the ISC SPNEGO implementation, we have made an exception in this case for reasons of stability and security.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Point of Sale 11 SP3:bind-9.9.6P1-0.51.26.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:bind-chrootenv-9.9.6P1-0.51.26.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:bind-devel-9.9.6P1-0.51.26.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:bind-doc-9.9.6P1-0.51.26.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:bind-libs-9.9.6P1-0.51.26.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:bind-utils-9.9.6P1-0.51.26.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-9.9.6P1-0.51.26.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-9.9.6P1-0.51.26.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-9.9.6P1-0.51.26.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-9.9.6P1-0.51.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-chrootenv-9.9.6P1-0.51.26.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-chrootenv-9.9.6P1-0.51.26.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-chrootenv-9.9.6P1-0.51.26.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-chrootenv-9.9.6P1-0.51.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-doc-9.9.6P1-0.51.26.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-doc-9.9.6P1-0.51.26.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-doc-9.9.6P1-0.51.26.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-doc-9.9.6P1-0.51.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-libs-32bit-9.9.6P1-0.51.26.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-libs-32bit-9.9.6P1-0.51.26.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-libs-32bit-9.9.6P1-0.51.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-libs-9.9.6P1-0.51.26.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-libs-9.9.6P1-0.51.26.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-libs-9.9.6P1-0.51.26.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-libs-9.9.6P1-0.51.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-utils-9.9.6P1-0.51.26.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-utils-9.9.6P1-0.51.26.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-utils-9.9.6P1-0.51.26.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-utils-9.9.6P1-0.51.26.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-25216", url: "https://www.suse.com/security/cve/CVE-2021-25216", }, { category: "external", summary: "SUSE Bug 1185345 for CVE-2021-25216", url: "https://bugzilla.suse.com/1185345", }, { category: "external", summary: "SUSE Bug 1189848 for CVE-2021-25216", url: "https://bugzilla.suse.com/1189848", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Point of Sale 11 SP3:bind-9.9.6P1-0.51.26.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:bind-chrootenv-9.9.6P1-0.51.26.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:bind-devel-9.9.6P1-0.51.26.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:bind-doc-9.9.6P1-0.51.26.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:bind-libs-9.9.6P1-0.51.26.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:bind-utils-9.9.6P1-0.51.26.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-9.9.6P1-0.51.26.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-9.9.6P1-0.51.26.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-9.9.6P1-0.51.26.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-9.9.6P1-0.51.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-chrootenv-9.9.6P1-0.51.26.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-chrootenv-9.9.6P1-0.51.26.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-chrootenv-9.9.6P1-0.51.26.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-chrootenv-9.9.6P1-0.51.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-doc-9.9.6P1-0.51.26.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-doc-9.9.6P1-0.51.26.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-doc-9.9.6P1-0.51.26.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-doc-9.9.6P1-0.51.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-libs-32bit-9.9.6P1-0.51.26.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-libs-32bit-9.9.6P1-0.51.26.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-libs-32bit-9.9.6P1-0.51.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-libs-9.9.6P1-0.51.26.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-libs-9.9.6P1-0.51.26.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-libs-9.9.6P1-0.51.26.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-libs-9.9.6P1-0.51.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-utils-9.9.6P1-0.51.26.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-utils-9.9.6P1-0.51.26.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-utils-9.9.6P1-0.51.26.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-utils-9.9.6P1-0.51.26.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Point of Sale 11 SP3:bind-9.9.6P1-0.51.26.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:bind-chrootenv-9.9.6P1-0.51.26.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:bind-devel-9.9.6P1-0.51.26.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:bind-doc-9.9.6P1-0.51.26.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:bind-libs-9.9.6P1-0.51.26.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:bind-utils-9.9.6P1-0.51.26.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-9.9.6P1-0.51.26.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-9.9.6P1-0.51.26.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-9.9.6P1-0.51.26.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-9.9.6P1-0.51.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-chrootenv-9.9.6P1-0.51.26.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-chrootenv-9.9.6P1-0.51.26.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-chrootenv-9.9.6P1-0.51.26.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-chrootenv-9.9.6P1-0.51.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-doc-9.9.6P1-0.51.26.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-doc-9.9.6P1-0.51.26.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-doc-9.9.6P1-0.51.26.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-doc-9.9.6P1-0.51.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-libs-32bit-9.9.6P1-0.51.26.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-libs-32bit-9.9.6P1-0.51.26.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-libs-32bit-9.9.6P1-0.51.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-libs-9.9.6P1-0.51.26.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-libs-9.9.6P1-0.51.26.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-libs-9.9.6P1-0.51.26.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-libs-9.9.6P1-0.51.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-utils-9.9.6P1-0.51.26.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-utils-9.9.6P1-0.51.26.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-utils-9.9.6P1-0.51.26.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:bind-utils-9.9.6P1-0.51.26.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-05-04T06:34:54Z", details: "important", }, ], title: "CVE-2021-25216", }, ], }
fkie_cve-2021-25216
Vulnerability from fkie_nvd
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vendor | Product | Version | |
---|---|---|---|
debian | debian_linux | 9.0 | |
debian | debian_linux | 10.0 | |
isc | bind | * | |
isc | bind | * | |
isc | bind | * | |
isc | bind | 9.9.3 | |
isc | bind | 9.9.12 | |
isc | bind | 9.9.13 | |
isc | bind | 9.10.5 | |
isc | bind | 9.10.7 | |
isc | bind | 9.11.3 | |
isc | bind | 9.11.5 | |
isc | bind | 9.11.5 | |
isc | bind | 9.11.5 | |
isc | bind | 9.11.6 | |
isc | bind | 9.11.7 | |
isc | bind | 9.11.8 | |
isc | bind | 9.11.12 | |
isc | bind | 9.11.21 | |
isc | bind | 9.11.27 | |
isc | bind | 9.11.29 | |
isc | bind | 9.16.8 | |
isc | bind | 9.16.11 | |
isc | bind | 9.16.13 | |
siemens | sinec_infrastructure_network_services | * | |
netapp | active_iq_unified_manager | - | |
netapp | cloud_backup | - | |
netapp | aff_a250_firmware | - | |
netapp | aff_a250 | - | |
netapp | aff_500f_firmware | - | |
netapp | aff_500f | - | |
netapp | h300s_firmware | - | |
netapp | h300s | - | |
netapp | h500s_firmware | - | |
netapp | h500s | - | |
netapp | h700s_firmware | - | |
netapp | h700s | - | |
netapp | h300e_firmware | - | |
netapp | h300e | - | |
netapp | h500e_firmware | - | |
netapp | h500e | - | |
netapp | h700e_firmware | - | |
netapp | h700e | - | |
netapp | h410s_firmware | - | |
netapp | h410s | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", matchCriteriaId: "DEECE5FC-CACF-4496-A3E7-164736409252", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", matchCriteriaId: "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:isc:bind:*:*:*:*:-:*:*:*", matchCriteriaId: "18B8AA9D-C4D1-4F3B-9440-FC29D925961D", versionEndExcluding: "9.11.31", versionStartIncluding: "9.0.0", vulnerable: true, }, { criteria: "cpe:2.3:a:isc:bind:*:*:*:*:-:*:*:*", matchCriteriaId: "E38EFB1A-11B5-403F-815F-4899E7007D02", versionEndExcluding: "9.16.15", versionStartIncluding: "9.12.0", vulnerable: true, }, { criteria: "cpe:2.3:a:isc:bind:*:*:*:*:-:*:*:*", matchCriteriaId: "00F9BCC7-51F7-47EE-AFCE-946F24CC3694", versionEndExcluding: "9.17.12", versionStartIncluding: "9.17.0", vulnerable: true, }, { criteria: "cpe:2.3:a:isc:bind:9.9.3:s1:*:*:supported_preview:*:*:*", matchCriteriaId: "40EE014B-0CD8-45F3-BEDB-AE6368A78B04", vulnerable: true, }, { criteria: "cpe:2.3:a:isc:bind:9.9.12:s1:*:*:supported_preview:*:*:*", matchCriteriaId: "DAF8FA8C-0526-4389-AEC6-92AD62AA3929", vulnerable: true, }, { criteria: "cpe:2.3:a:isc:bind:9.9.13:s1:*:*:supported_preview:*:*:*", matchCriteriaId: "1A9BA952-A5DF-4CBA-8928-0B373C013C32", vulnerable: true, }, { criteria: "cpe:2.3:a:isc:bind:9.10.5:s1:*:*:supported_preview:*:*:*", matchCriteriaId: "CAD41122-C5D8-4256-8CB7-FF88DCD96A13", vulnerable: true, }, { criteria: "cpe:2.3:a:isc:bind:9.10.7:s1:*:*:supported_preview:*:*:*", matchCriteriaId: "6243685F-1E5B-4FF6-AE1B-44798032FBA6", vulnerable: true, }, { criteria: "cpe:2.3:a:isc:bind:9.11.3:s1:*:*:supported_preview:*:*:*", matchCriteriaId: "C2FE13E1-0646-46FC-875B-CB4C34E20101", vulnerable: true, }, { criteria: "cpe:2.3:a:isc:bind:9.11.5:s3:*:*:supported_preview:*:*:*", matchCriteriaId: "1AA16E51-819C-4A1B-B66E-1C60C1782C0D", vulnerable: true, }, { criteria: "cpe:2.3:a:isc:bind:9.11.5:s5:*:*:supported_preview:*:*:*", matchCriteriaId: "91533F9F-C0E5-4E84-8A4C-F744F956BF97", vulnerable: true, }, { criteria: "cpe:2.3:a:isc:bind:9.11.5:s6:*:*:supported_preview:*:*:*", matchCriteriaId: "46E6A4BD-D69B-4A70-821D-5612DD1315EF", vulnerable: true, }, { criteria: "cpe:2.3:a:isc:bind:9.11.6:s1:*:*:supported_preview:*:*:*", matchCriteriaId: "8AF9D390-0D5B-4963-A2D3-BF1E7CD95E9D", vulnerable: true, }, { criteria: "cpe:2.3:a:isc:bind:9.11.7:s1:*:*:supported_preview:*:*:*", matchCriteriaId: "AB2B92F1-6BA8-41CA-9000-E0633462CC28", vulnerable: true, }, { criteria: "cpe:2.3:a:isc:bind:9.11.8:s1:*:*:supported_preview:*:*:*", matchCriteriaId: "02CA4635-7DFC-408E-A837-856E0F96CA1B", vulnerable: true, }, { criteria: "cpe:2.3:a:isc:bind:9.11.12:s1:*:*:supported_preview:*:*:*", matchCriteriaId: "3CABCB08-B838-45F7-AA87-77C6B8767DD0", vulnerable: true, }, { criteria: "cpe:2.3:a:isc:bind:9.11.21:s1:*:*:supported_preview:*:*:*", matchCriteriaId: "5CC1F26C-4757-4C87-BD8B-2FA456A88C6F", vulnerable: true, }, { criteria: "cpe:2.3:a:isc:bind:9.11.27:s1:*:*:supported_preview:*:*:*", matchCriteriaId: "582A4948-B64F-45D4-807A-846A85BB6B42", vulnerable: true, }, { criteria: "cpe:2.3:a:isc:bind:9.11.29:s1:*:*:supported_preview:*:*:*", matchCriteriaId: "F22E7F6A-0714-480D-ACDF-5027FD6697B2", vulnerable: true, }, { criteria: "cpe:2.3:a:isc:bind:9.16.8:s1:*:*:supported_preview:*:*:*", matchCriteriaId: "288EAD80-574B-4839-9C2C-81D6D088A733", vulnerable: true, }, { criteria: "cpe:2.3:a:isc:bind:9.16.11:s1:*:*:supported_preview:*:*:*", matchCriteriaId: "3595F024-F910-4356-8B5B-D478960FF574", vulnerable: true, }, { criteria: "cpe:2.3:a:isc:bind:9.16.13:s1:*:*:supported_preview:*:*:*", matchCriteriaId: "94661BA2-27F8-4FFE-B844-9404F735579D", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:siemens:sinec_infrastructure_network_services:*:*:*:*:*:*:*:*", matchCriteriaId: "B0F46497-4AB0-49A7-9453-CC26837BF253", versionEndExcluding: "1.0.1.1", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vsphere:*:*", matchCriteriaId: "E8F29E19-3A64-4426-A2AA-F169440267CC", vulnerable: true, }, { criteria: "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*", matchCriteriaId: "5C2089EE-5D7F-47EC-8EA5-0F69790564C4", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netapp:aff_a250_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "0D5DE972-F8B8-4964-943A-DA0BD18289D1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netapp:aff_a250:-:*:*:*:*:*:*:*", matchCriteriaId: "D4B1F59C-6ADA-4930-834F-2A8A8444F6AE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netapp:aff_500f_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "578BB9A7-BF28-4068-A9A6-1DE19CEEC293", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netapp:aff_500f:-:*:*:*:*:*:*:*", matchCriteriaId: "2AB58180-E5E0-4056-ABF9-A99E9F6A9E86", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6770B6C3-732E-4E22-BF1C-2D2FD610061C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*", matchCriteriaId: "9F9C8C20-42EB-4AB5-BD97-212DEB070C43", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "7FFF7106-ED78-49BA-9EC5-B889E3685D53", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*", matchCriteriaId: "E63D8B0F-006E-4801-BF9D-1C001BBFB4F9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "56409CEC-5A1E-4450-AA42-641E459CC2AF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*", matchCriteriaId: "B06F4839-D16A-4A61-9BB5-55B13F41E47F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netapp:h300e_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "108A2215-50FB-4074-94CF-C130FA14566D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netapp:h300e:-:*:*:*:*:*:*:*", matchCriteriaId: "7AFC73CE-ABB9-42D3-9A71-3F5BC5381E0E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netapp:h500e_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "32F0B6C0-F930-480D-962B-3F4EFDCC13C7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netapp:h500e:-:*:*:*:*:*:*:*", matchCriteriaId: "803BC414-B250-4E3A-A478-A3881340D6B8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netapp:h700e_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "0FEB3337-BFDE-462A-908B-176F92053CEC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netapp:h700e:-:*:*:*:*:*:*:*", matchCriteriaId: "736AEAE9-782B-4F71-9893-DED53367E102", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D0B4AD8A-F172-4558-AEC6-FF424BA2D912", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*", matchCriteriaId: "8497A4C9-8474-4A62-8331-3FE862ED4098", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "In BIND 9.5.0 -> 9.11.29, 9.12.0 -> 9.16.13, and versions BIND 9.11.3-S1 -> 9.11.29-S1 and 9.16.8-S1 -> 9.16.13-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -> 9.17.1 of the BIND 9.17 development branch, BIND servers are vulnerable if they are running an affected version and are configured to use GSS-TSIG features. In a configuration which uses BIND's default settings the vulnerable code path is not exposed, but a server can be rendered vulnerable by explicitly setting values for the tkey-gssapi-keytab or tkey-gssapi-credential configuration options. Although the default configuration is not vulnerable, GSS-TSIG is frequently used in networks where BIND is integrated with Samba, as well as in mixed-server environments that combine BIND servers with Active Directory domain controllers. For servers that meet these conditions, the ISC SPNEGO implementation is vulnerable to various attacks, depending on the CPU architecture for which BIND was built: For named binaries compiled for 64-bit platforms, this flaw can be used to trigger a buffer over-read, leading to a server crash. For named binaries compiled for 32-bit platforms, this flaw can be used to trigger a server crash due to a buffer overflow and possibly also to achieve remote code execution. We have determined that standard SPNEGO implementations are available in the MIT and Heimdal Kerberos libraries, which support a broad range of operating systems, rendering the ISC implementation unnecessary and obsolete. Therefore, to reduce the attack surface for BIND users, we will be removing the ISC SPNEGO implementation in the April releases of BIND 9.11 and 9.16 (it had already been dropped from BIND 9.17). We would not normally remove something from a stable ESV (Extended Support Version) of BIND, but since system libraries can replace the ISC SPNEGO implementation, we have made an exception in this case for reasons of stability and security.", }, { lang: "es", value: "En BIND versiones 9.5.0 posteriores a 9.11.29, versiones 9.12.0 posteriores a 9.16.13, y BIND versiones 9.11.3-S1 posteriores a 9.11.29-S1 y versiones 9.16.8-S1 posteriores a 9.16.13-S1 de BIND Supported Preview Edition, así como las versiones 9.17.0 posteriores 9.17.1 de la rama de desarrollo BIND 9.17, los servidores BIND son vulnerables si ejecutan una versión afectada y están configurados para usar las funcionalidades GSS-TSIG. En una configuración que usa la configuración predeterminada de BIND, la ruta del código vulnerable no está expuesta, pero un servidor puede volverse vulnerable al ajustar valores explícitamente para las opciones de configuración tkey-gssapi-keytab o tkey-gssapi-credential. Aunque la configuración predeterminada no es vulnerable, GSS-TSIG es usado con frecuencia en redes donde BIND está integrado con Samba, así como en entornos de servidores mixtos que combinan servidores BIND con controladores de dominio de Active Directory. Para los servidores que cumplen con estas condiciones, la implementación de ISC SPNEGO es vulnerable a varios ataques, dependiendo de la arquitectura de la CPU para la que se construyó BIND: Para binarios con nombre compilados para plataformas de 64 bits, este fallo puede ser usado para desencadenar una sobrelectura del búfer, conllevando a un bloqueo del servidor. Para binarios con nombre compilados para plataformas de 32 bits, este fallo puede ser usado para desencadenar un bloqueo del servidor debido a un desbordamiento del búfer y posiblemente también para lograr la Ejecución de Código Remota. Hemos determinado que las implementaciones estándar de SPNEGO están disponibles en las bibliotecas MIT y Heimdal Kerberos, que admiten una amplia gama de sistemas operativos, lo que hace que la implementación de ISC sea innecesaria y obsoleta. Por lo tanto, para reducir la superficie de ataque para los usuarios de BIND, eliminaremos la implementación de ISC SPNEGO en las versiones de abril de BIND 9.11 y 9. 16 (ya se había eliminado de BIND 9.17). Normalmente no eliminaríamos algo de una ESV (versión de soporte extendido) estable de BIND, pero dado que las bibliotecas del sistema pueden reemplazar la implementación de ISC SPNEGO, hemos hecho una excepción en este caso por razones de estabilidad y seguridad", }, ], id: "CVE-2021-25216", lastModified: "2024-11-21T05:54:33.850", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 6.8, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 2.2, impactScore: 5.9, source: "security-officer@isc.org", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-04-29T01:15:08.047", references: [ { source: "security-officer@isc.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://www.openwall.com/lists/oss-security/2021/04/29/1", }, { source: "security-officer@isc.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://www.openwall.com/lists/oss-security/2021/04/29/2", }, { source: "security-officer@isc.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://www.openwall.com/lists/oss-security/2021/04/29/3", }, { source: "security-officer@isc.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://www.openwall.com/lists/oss-security/2021/04/29/4", }, { source: "security-officer@isc.org", tags: [ "Patch", "Third Party Advisory", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf", }, { source: "security-officer@isc.org", tags: [ "Not Applicable", ], url: "https://kb.isc.org/v1/docs/cve-2021-25215", }, { source: "security-officer@isc.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2021/05/msg00001.html", }, { source: "security-officer@isc.org", tags: [ "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20210521-0006/", }, { source: "security-officer@isc.org", tags: [ "Third Party Advisory", ], url: "https://www.debian.org/security/2021/dsa-4909", }, { source: "security-officer@isc.org", tags: [ "Third Party Advisory", "VDB Entry", ], url: "https://www.zerodayinitiative.com/advisories/ZDI-21-657/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://www.openwall.com/lists/oss-security/2021/04/29/1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://www.openwall.com/lists/oss-security/2021/04/29/2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://www.openwall.com/lists/oss-security/2021/04/29/3", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://www.openwall.com/lists/oss-security/2021/04/29/4", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Third Party Advisory", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Not Applicable", ], url: "https://kb.isc.org/v1/docs/cve-2021-25215", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2021/05/msg00001.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20210521-0006/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://www.debian.org/security/2021/dsa-4909", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "https://www.zerodayinitiative.com/advisories/ZDI-21-657/", }, ], sourceIdentifier: "security-officer@isc.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-125", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Log in or create an account to share your comment.
This schema specifies the format of a comment related to a security advisory.
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.