Under certain circumstances, BIND is too lenient when accepting records from answers, allowing an attacker to inject forged data into the cache. This issue affects BIND 9 versions 9.11.0 through 9.16.50, 9.18.0 through 9.18.39, 9.20.0 through 9.20.13, 9.21.0 through 9.21.12, 9.11.3-S1 through 9.16.50-S1, 9.18.11-S1 through 9.18.39-S1, and 9.20.9-S1 through 9.20.13-S1.
The product, when processing trusted data, accepts any untrusted data that is also included with the trusted data, treating the untrusted data as if it were trusted.
| Name | Vendor | Start Version | End Version |
|---|---|---|---|
| Bind9 | Ubuntu | devel | * |
| Bind9 | Ubuntu | esm-infra/bionic | * |
| Bind9 | Ubuntu | esm-infra/focal | * |
| Bind9 | Ubuntu | jammy | * |
| Bind9 | Ubuntu | noble | * |
| Bind9 | Ubuntu | plucky | * |
| Bind9 | Ubuntu | questing | * |
| Bind9 | Ubuntu | upstream | * |