CVE-2021-25216 log

Source
Severity High
Remote Yes
Type Arbitrary code execution
Description
BIND servers before version 9.16.14 are vulnerable if they are running an affected version and are configured to use GSS-TSIG features. In a configuration which uses BIND's default settings the vulnerable code path is not exposed, but a server can be rendered vulnerable by explicitly setting values for the tkey-gssapi-keytab or tkey-gssapi-credential configuration options. Although the default configuration is not vulnerable, GSS-TSIG is frequently used in networks where BIND is integrated with Samba, as well as in mixed-server environments that combine BIND servers with Active Directory domain controllers. For servers that meet these conditions, the ISC SPNEGO implementation is vulnerable to various attacks, depending on the CPU architecture for which BIND was built: For named binaries compiled for 64-bit platforms, this flaw can be used to trigger a buffer over-read, leading to a server crash.
Group Package Affected Fixed Severity Status Ticket
AVG-1890 bind 9.16.13-1 9.16.15-1 High Fixed
Date Advisory Group Package Severity Type
29 Apr 2021 ASA-202104-10 AVG-1890 bind High multiple issues
References
https://kb.isc.org/docs/cve-2021-25216