In BIND 9.0.0 -> 9.11.21, 9.12.0 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.9.3-S1 -> 9.11.21-S1 of the BIND 9 Supported Preview Edition, An attacker on the network path for a TSIG-signed request, or operating the server receiving the TSIG-signed request, could send a truncated response to that request, triggering an assertion failure, causing the server to exit. Alternately, an off-path attacker would have to correctly guess when a TSIG-signed request was sent, along with other characteristics of the packet and message, and spoof a truncated response to trigger an assertion failure, causing the server to exit.
{
"unresolved_ranges": [
{
"extracted_events": [
{
"last_affected": "9.11.21-s1"
}
],
"source": "CPE_FIELD",
"cpe": "cpe:2.3:a:isc:bind:9.11.21:s1:*:*:supported_preview:*:*:*"
},
{
"extracted_events": [
{
"introduced": "8.0.0"
},
{
"last_affected": "8.5.0"
}
],
"source": "CPE_FIELD",
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:*:*:*:*:*:*:*:*"
},
{
"extracted_events": [
{
"fixed": "2.2.2-5028"
}
],
"source": "CPE_FIELD",
"cpe": "cpe:2.3:a:synology:dns_server:*:*:*:*:*:*:*:*"
},
{
"extracted_events": [
{
"last_affected": "12.04"
}
],
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*"
},
{
"extracted_events": [
{
"last_affected": "14.04"
}
],
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*"
},
{
"extracted_events": [
{
"last_affected": "16.04"
}
],
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*"
},
{
"extracted_events": [
{
"last_affected": "18.04"
}
],
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"
},
{
"extracted_events": [
{
"last_affected": "20.04"
}
],
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*"
},
{
"extracted_events": [
{
"last_affected": "10.0"
}
],
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
},
{
"extracted_events": [
{
"last_affected": "31"
}
],
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*"
},
{
"extracted_events": [
{
"last_affected": "32"
}
],
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*"
},
{
"extracted_events": [
{
"last_affected": "15.1"
}
],
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"
},
{
"extracted_events": [
{
"last_affected": "15.2"
}
],
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*"
}
]
}{
"extracted_events": [
{
"introduced": "9.0.0"
},
{
"last_affected": "9.11.21"
},
{
"introduced": "9.12.0"
},
{
"last_affected": "9.16.5"
},
{
"introduced": "9.17.0"
},
{
"last_affected": "9.17.3"
},
{
"introduced": "0"
},
{
"last_affected": "9.9.3-s1"
},
{
"last_affected": "9.0"
}
],
"source": "CPE_FIELD",
"cpe": [
"cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.9.3:s1:*:*:supported_preview:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
]
}