Saturday, June 14, 2025
Advertisements

BIND DNS Vulnerability Allows Remote Server Crashes with Single Malicious Packet

by Charline

A serious security flaw in the widely used BIND DNS software can let attackers crash DNS servers with a single malicious packet. The flaw, tracked as CVE-2025-40775, affects specific versions of BIND and has been rated high severity.

The Internet Systems Consortium (ISC) released updates on May 21, 2025, to fix the issue in BIND versions 9.18.37, 9.20.9, and 9.21.8. Versions 9.20.0 to 9.20.8 and 9.21.0 to 9.21.7 are vulnerable. The older 9.18.x Extended Support Version (ESV) is not affected.

Advertisements

How the Attack Works

The flaw is related to how BIND handles Transaction Signatures (TSIG), a method used to secure DNS messages between servers. When a DNS message with a TSIG is processed and contains an invalid algorithm field, vulnerable BIND versions crash with an assertion failure.

The issue is categorized under CWE-232 (Improper Handling of Undefined Values) and has a CVSS score of 7.5, marking it as a high-risk vulnerability.

Because the error occurs early in the packet processing stage, attackers only need to send one malformed packet from anywhere on the internet to trigger a denial-of-service (DoS). No login or access credentials are required.

Impact and Risk

This flaw can affect both authoritative and recursive DNS servers. Standard security measures like access control lists (ACLs) do not block the exploit.

DNS servers play a critical role by translating website names into IP addresses. Disrupting their function could impact large parts of the internet. Security researcher Rob Graham has warned that similar past vulnerabilities showed how easily attackers could crash large numbers of public-facing DNS servers.

Affected Versions

Product Affected Versions Impact CVSS Score
BIND 9 9.20.0 – 9.20.8, 9.21.0 – 9.21.7 Denial of Service (Crash) 7.5 (High)

Mitigation Steps

Organizations should immediately update to the patched versions: BIND 9.20.9 or 9.21.8. These versions are available from the ISC download page.

There are currently no workarounds available, and patching is the only effective protection. Administrators should also note that the 9.18.x ESV branch is not vulnerable.

The ISC recommends regularly checking for updates and staying current on platform support timelines. Support for RHEL 7 ended in June 2024, and future BIND versions will not support it.

Advertisements

You may also like

blank

At ProxyServerPro, we are dedicated to providing cutting-edge proxy solutions tailored to meet the diverse needs of businesses and individuals. Our platform offers a comprehensive range of high-performance proxies, including residential, datacenter, and mobile options, ensuring seamless browsing, data scraping, and online anonymity. With a focus on reliability, speed, and security, we empower users to navigate the digital landscape with confidence. Whether you’re managing ad verification, market research, or web automation, ProxyServerPro is your trusted partner for scalable, efficient, and secure proxy services. Explore our portal to discover how we can elevate your online experience.

© 2024 Copyright  proxyserverpro.com