In specific circumstances, due to a weakness in the...
High severity
Unreviewed
Published
Oct 22, 2025
to the GitHub Advisory Database
•
Updated Oct 22, 2025
Description
Published by the National Vulnerability Database
Oct 22, 2025
Published to the GitHub Advisory Database
Oct 22, 2025
Last updated
Oct 22, 2025
In specific circumstances, due to a weakness in the Pseudo Random Number Generator (PRNG) that is used, it is possible for an attacker to predict the source port and query ID that BIND will use.
This issue affects BIND 9 versions 9.16.0 through 9.16.50, 9.18.0 through 9.18.39, 9.20.0 through 9.20.13, 9.21.0 through 9.21.12, 9.16.8-S1 through 9.16.50-S1, 9.18.11-S1 through 9.18.39-S1, and 9.20.9-S1 through 9.20.13-S1.
References