Ce mail provient de l'extérieur, restons vigilants

=====================================================================

                            CERT-Renater
d
                Note d'Information No. 2025/VULN725
_____________________________________________________________________

DATE                : 23/10/2025

HARDWARE PLATFORM(S): /

OPERATING SYSTEM(S): Systems running BIND versions prior to
                           9.18.41, 9.20.15, 9.21.14,
                    BIND Supported Preview Edition versions prior to
                               9.18.41-S1, 9.20.15-S1.

=====================================================================
https://kb.isc.org/docs/cve-2025-40780
https://kb.isc.org/docs/cve-2025-40778
https://kb.isc.org/docs/cve-2025-8677
_____________________________________________________________________

CVE-2025-40780: Cache poisoning due to weak PRNG
New

    Published on Oct 22, 2025 

    Darren Ankney

        Documentation
        BIND 9
        Security Advisories

CVE-2025-40780: Cache poisoning due to weak PRNG

CVE: CVE-2025-40780

Title: Cache poisoning due to weak PRNG

Document version: 2.0

Posting date: 22 October 2025

Program impacted: BIND 9

Versions affected:

BIND

    9.16.0 -> 9.16.50
    9.18.0 -> 9.18.39
    9.20.0 -> 9.20.13
    9.21.0 -> 9.21.12

BIND Supported Preview Edition

    9.16.8-S1 -> 9.16.50-S1
    9.18.11-S1 -> 9.18.39-S1
    9.20.9-S1 -> 9.20.13-S1

(Versions prior to 9.11.0 were not assessed.)

Severity: High

Exploitable: Remotely

Description:

In specific circumstances, due to a weakness in the Pseudo Random
Number Generator (PRNG) that is used, it is possible for an
attacker to predict the source port and query ID that BIND will
use.


Impact:

BIND can be tricked into caching attacker responses, if the
spoofing is successful.

    Authoritative services are believed to be unaffected by this
vulnerability but it is important to read:
https://kb.isc.org/docs/why-does-my-authoritative-server-make-recursive-queries

    Resolvers are affected by this vulnerability.

CVSS Score: 8.6

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N

For more information on the Common Vulnerability Scoring System
and to obtain your specific environmental score please visit:
https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N&version=3.1.


Workarounds:

No workarounds known.


Active exploits:

We are not aware of any active exploits.


Solution:

Upgrade to the patched release most closely related to your
current version of BIND 9:

    9.18.41
    9.20.15
    9.21.14

BIND Supported Preview Edition is a special feature preview
branch of BIND provided to eligible ISC support customers.

    9.18.41-S1
    9.20.15-S1


Acknowledgments:

ISC would like to thank Prof. Amit Klein and Omer Ben Simhon
from Hebrew University of Jerusalem for bringing this
vulnerability to our attention.


Document revision history:

    1.0 Early Notification, 8 October 2025
    1.1 Revised public disclosure date, 14 October 2025
    1.2 Revised the list of fixed versions, 15 October 2025
    2.0 Public disclosure, 22 October 2025


Related documents:

See our BIND 9 Security Vulnerability Matrix for a complete
listing of security vulnerabilities and versions affected.

Do you still have questions? Questions regarding this advisory
should be mailed to bind-security@isc.org or posted as
confidential GitLab issues at
https://gitlab.isc.org/isc-projects/bind9/-/issues/new?issue[confidential]=true.


Note:

ISC patches only currently supported versions. When
possible we indicate EOL versions affected. For current
information on which versions are actively supported,
please see https://www.isc.org/download/.


ISC Security Vulnerability Disclosure Policy:

Details of our current security advisory policy and practice
can be found in the ISC Software Defect and Security
Vulnerability Disclosure Policy at
https://kb.isc.org/docs/aa-00861.

The Knowledgebase article
https://kb.isc.org/docs/cve-2025-40780 is the complete and
official security advisory document.


Legal Disclaimer:

Internet Systems Consortium (ISC) is providing this notice on
an "AS IS" basis. No warranty or guarantee of any kind is
expressed in this notice and none should be implied. ISC
expressly excludes and disclaims any warranties regarding
this notice or materials referred to in this notice, including,
without limitation, any implied warranty of merchantability,
fitness for a particular purpose, absence of hidden defects,
or of non-infringement. Your use or reliance on this notice
or materials referred to in this notice is at your own risk.
ISC may change this notice at any time. A stand-alone copy
or paraphrase of the text of this document that omits the
document URL is an uncontrolled copy. Uncontrolled copies
may lack important information, be out of date, or contain
factual errors.

_____________________________________________________________________

CVE-2025-40778: Cache poisoning attacks with unsolicited RRs
New

    Published on Oct 22, 2025 

    Darren Ankney

        Documentation
        BIND 9
        Security Advisories

CVE-2025-40778: Cache poisoning attacks with unsolicited RRs

CVE: CVE-2025-40778

Title: Cache poisoning attacks with unsolicited RRs

Document version: 2.0

Posting date: 22 October 2025

Program impacted: BIND 9

Versions affected:

BIND

    9.11.0 -> 9.16.50
    9.18.0 -> 9.18.39
    9.20.0 -> 9.20.13
    9.21.0 -> 9.21.12

BIND Supported Preview Edition

    9.11.3-S1 -> 9.16.50-S1
    9.18.11-S1 -> 9.18.39-S1
    9.20.9-S1 -> 9.20.13-S1

(Versions prior to 9.11.0 were not specifically assessed but
are also believed to be affected)

Severity: High

Exploitable: Remotely


Description:

Under certain circumstances, BIND is too lenient when
accepting records from answers, allowing an attacker to
inject forged data into the cache.


Impact:

Forged records can be injected into cache during a query,
which can potentially affect resolution of future queries.

    Authoritative services are believed to be unaffected
by this vulnerability but it is important to read:
https://kb.isc.org/docs/why-does-my-authoritative-server-make-recursive-queries

    Resolvers are affected by this vulnerability.

CVSS Score: 8.6

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N

For more information on the Common Vulnerability Scoring
System and to obtain your specific environmental score
please visit:
https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N&version=3.1.


Workarounds:

No workarounds known.


Active exploits:

We are not aware of any active exploits.


Solution:

Upgrade to the patched release most closely related to
your current version of BIND 9:

    9.18.41
    9.20.15
    9.21.14

BIND Supported Preview Edition is a special feature preview
branch of BIND provided to eligible ISC support customers.

    9.18.41-S1
    9.20.15-S1


Acknowledgments:

ISC would like to thank Yuxiao Wu, Yunyi Zhang, Baojun Liu,
and Haixin Duan from Tsinghua University for bringing this
vulnerability to our attention.


Document revision history:

    1.0 Early Notification, 8 October 2025
    1.1 Revised public disclosure date, 14 October 2025
    1.2 Revised the list of fixed versions, 15 October 2025
    2.0 Public disclosure, 22 October 2025


Related documents:

See our BIND 9 Security Vulnerability Matrix for a complete
listing of security vulnerabilities and versions affected.

Do you still have questions? Questions regarding this
advisory should be mailed to bind-security@isc.org or
posted as confidential GitLab issues at
https://gitlab.isc.org/isc-projects/bind9/-/issues/new?issue[confidential]=true.

Note:

ISC patches only currently supported versions. When possible
we indicate EOL versions affected. For current information
on which versions are actively supported, please see
https://www.isc.org/download/.


ISC Security Vulnerability Disclosure Policy:

Details of our current security advisory policy and practice
can be found in the ISC Software Defect and Security
Vulnerability Disclosure Policy at
https://kb.isc.org/docs/aa-00861.

The Knowledgebase article
https://kb.isc..org/docs/cve-2025-40778 is the complete
and official security advisory document.


Legal Disclaimer:

Internet Systems Consortium (ISC) is providing this notice
on an "AS IS" basis. No warranty or guarantee of any kind
is expressed in this notice and none should be implied. ISC
expressly excludes and disclaims any warranties regarding
this notice or materials referred to in this notice,
including, without limitation, any implied warranty of
merchantability, fitness for a particular purpose, absence
of hidden defects, or of non-infringement. Your use or
reliance on this notice or materials referred to in this
notice is at your own risk. ISC may change this notice at
any time. A stand-alone copy or paraphrase of the text of
this document that omits the document URL is an
uncontrolled copy. Uncontrolled copies may lack important
information, be out of date, or contain factual errors.

_____________________________________________________________________

 CVE-2025-8677: Resource exhaustion via malformed DNSKEY handling
New

    Published on Oct 22, 2025 

    DF
    Ben Scott

        Documentation
        BIND 9
        Security Advisories

CVE-2025-8677: Resource exhaustion via malformed DNSKEY handling

CVE: CVE-2025-8677

Title: Resource exhaustion via malformed DNSKEY handling

Document version: 2.0

Posting date: 22 October 2025

Program impacted: BIND 9

Versions affected:

BIND

    9.18.0 -> 9.18.39
    9.20.0 -> 9.20.13
    9.21.0 -> 9.21.12

BIND Supported Preview Edition

    9.18.11-S1 -> 9.18.39-S1
    9.20.9-S1 -> 9.20.13-S1

Severity: High

Exploitable: Remotely

Description:

Querying for records within a specially crafted zone containing
certain malformed DNSKEY records can lead to CPU exhaustion.


Impact:

An attacker could overwhelm the server, significantly impacting
performance and leading to denial of service for legitimate
clients.

    Authoritative services are believed to be unaffected by
this vulnerability but it is important to read:
https://kb.isc.org/docs/why-does-my-authoritative-server-make-recursive-queries

    Resolvers are affected by this vulnerability.

CVSS Score: 7.5

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

For more information on the Common Vulnerability Scoring System
and to obtain your specific environmental score please visit:
https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&version=3.1.


Workarounds:

No workarounds known.


Active exploits:

We are not aware of any active exploits.

Solution:

Upgrade to the patched release most closely related to your
current version of BIND 9:

    9.18.41
    9.20.15
    9.21.14

BIND Supported Preview Edition is a special feature preview
branch of BIND provided to eligible ISC support customers.

    9.18.41-S1
    9.20.15-S1


Acknowledgments:

ISC would like to thank Zuyao Xu and Xiang Li from the
All-in-One Security and Privacy Laboratory at Nankai
University for bringing this vulnerability to our
attention.


Document revision history:

    1.0 Early Notification, 8 October 2025
    1.1 Early fix withdrawn due to regression, 13 October 2025
    1.2 Revised public disclosure date, 14 October 2025
    1.3 Revised the list of fixed versions, 15 October 2025
    2.0 Public disclosure, 22 October 2025


Related documents:

See our BIND 9 Security Vulnerability Matrix for a complete
listing of security vulnerabilities and versions affected.

Do you still have questions? Questions regarding this
advisory should be mailed to bind-security@isc.org or
posted as confidential GitLab issues at
https://gitlab.isc.org/isc-projects/bind9/-/issues/new?issue[confidential]=true.

Note:

ISC patches only currently supported versions. When possible
we indicate EOL versions affected. For current information
on which versions are actively supported, please see
https://www.isc.org/download/.


ISC Security Vulnerability Disclosure Policy:

Details of our current security advisory policy and practice
can be found in the ISC Software Defect and Security
Vulnerability Disclosure Policy at
https://kb.isc.org/docs/aa-00861.

The Knowledgebase article https://kb.isc.org/docs/cve-2025-8677
is the complete and official security advisory document.


Legal Disclaimer:

Internet Systems Consortium (ISC) is providing this notice on
an "AS IS" basis. No warranty or guarantee of any kind is
expressed in this notice and none should be implied. ISC
expressly excludes and disclaims any warranties regarding
this notice or materials referred to in this notice, including,
without limitation, any implied warranty of merchantability,
fitness for a particular purpose, absence of hidden defects,
or of non-infringement. Your use or reliance on this notice or
materials referred to in this notice is at your own risk. ISC
may change this notice at any time. A stand-alone copy or
paraphrase of the text of this document that omits the document
URL is an uncontrolled copy. Uncontrolled copies may lack
important information, be out of date, or contain factual
errors.


=========================================================
+ CERT-RENATER        |    tel : 01-53-94-20-44         +
+ 23/25 Rue Daviel    |    fax : 01-53-94-20-41         +
+ 75013 Paris         |   email:cert@support.renater.fr +
=========================================================




