SUSE update for bind



Risk Medium
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2021-25220
CWE-ID CWE-350
Exploitation vector Network
Public exploit N/A
Vulnerable software
SUSE OpenStack Cloud Crowbar
Operating systems & Components / Operating system

SUSE Linux Enterprise Software Development Kit
Operating systems & Components / Operating system

SUSE Linux Enterprise Server for SAP
Operating systems & Components / Operating system

SUSE Linux Enterprise Server for SAP Applications
Operating systems & Components / Operating system

SUSE Linux Enterprise Server
Operating systems & Components / Operating system

SUSE OpenStack Cloud
Operating systems & Components / Operating system

bind-devel
Operating systems & Components / Operating system package or component

python-bind
Operating systems & Components / Operating system package or component

bind-doc
Operating systems & Components / Operating system package or component

liblwres161-debuginfo
Operating systems & Components / Operating system package or component

liblwres161
Operating systems & Components / Operating system package or component

libisccfg163-debuginfo
Operating systems & Components / Operating system package or component

libisccfg163
Operating systems & Components / Operating system package or component

libisccc161-debuginfo
Operating systems & Components / Operating system package or component

libisccc161
Operating systems & Components / Operating system package or component

libisc1107-debuginfo
Operating systems & Components / Operating system package or component

libisc1107-debuginfo-32bit
Operating systems & Components / Operating system package or component

libisc1107
Operating systems & Components / Operating system package or component

libisc1107-32bit
Operating systems & Components / Operating system package or component

libirs161-debuginfo
Operating systems & Components / Operating system package or component

libirs161
Operating systems & Components / Operating system package or component

libdns1110-debuginfo
Operating systems & Components / Operating system package or component

libdns1110
Operating systems & Components / Operating system package or component

libbind9-161-debuginfo
Operating systems & Components / Operating system package or component

libbind9-161
Operating systems & Components / Operating system package or component

bind-utils-debuginfo
Operating systems & Components / Operating system package or component

bind-utils
Operating systems & Components / Operating system package or component

bind-debugsource
Operating systems & Components / Operating system package or component

bind-debuginfo
Operating systems & Components / Operating system package or component

bind-chrootenv
Operating systems & Components / Operating system package or component

bind
Operating systems & Components / Operating system package or component

Vendor SUSE

Security Bulletin

This security bulletin contains one medium risk vulnerability.

1) Reliance on Reverse DNS Resolution for a Security-Critical Action

EUVDB-ID: #VU61422

Risk: Medium

CVSSv4.0: 2.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:H/SA:N/E:U/U:Green]

CVE-ID: CVE-2021-25220

CWE-ID: CWE-350 - Reliance on Reverse DNS Resolution for a Security-Critical Action

Exploit availability: No

Description

The vulnerability allows a remote attacker to poison DNS cache.

The vulnerability exists due to an error in DNS forwarder implementation. When using forwarders, bogus NS records supplied by, or via, those forwarders may be cached and used by named if it needs to recurse for any reason, causing it to obtain and pass on potentially incorrect answers. The cache could become poisoned with incorrect records leading to queries being made to the wrong servers, which might also result in false information being returned to clients.


Mitigation

Update the affected package bind to the latest version.

Vulnerable software versions

SUSE OpenStack Cloud Crowbar: 9

SUSE Linux Enterprise Software Development Kit: 12-SP5

SUSE Linux Enterprise Server for SAP: 12-SP4

SUSE Linux Enterprise Server for SAP Applications: 12-SP5

SUSE Linux Enterprise Server: 12-SP4-LTSS - 12-SP5

SUSE OpenStack Cloud: 9

bind-devel: before 9.11.22-3.40.1

python-bind: before 9.11.22-3.40.1

bind-doc: before 9.11.22-3.40.1

liblwres161-debuginfo: before 9.11.22-3.40.1

liblwres161: before 9.11.22-3.40.1

libisccfg163-debuginfo: before 9.11.22-3.40.1

libisccfg163: before 9.11.22-3.40.1

libisccc161-debuginfo: before 9.11.22-3.40.1

libisccc161: before 9.11.22-3.40.1

libisc1107-debuginfo: before 9.11.22-3.40.1

libisc1107-debuginfo-32bit: before 9.11.22-3.40.1

libisc1107: before 9.11.22-3.40.1

libisc1107-32bit: before 9.11.22-3.40.1

libirs161-debuginfo: before 9.11.22-3.40.1

libirs161: before 9.11.22-3.40.1

libdns1110-debuginfo: before 9.11.22-3.40.1

libdns1110: before 9.11.22-3.40.1

libbind9-161-debuginfo: before 9.11.22-3.40.1

libbind9-161: before 9.11.22-3.40.1

bind-utils-debuginfo: before 9.11.22-3.40.1

bind-utils: before 9.11.22-3.40.1

bind-debugsource: before 9.11.22-3.40.1

bind-debuginfo: before 9.11.22-3.40.1

bind-chrootenv: before 9.11.22-3.40.1

bind: before 9.11.22-3.40.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2022/suse-su-20220908-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###