Korean
<< Back
VID 19018
Severity 30
Port 53
Protocol UDP
Class DNS
Detailed Description The BIND daemon, according to its version number, has a denial of service vulnerability in the 'authvalidator()' function. ISC BIND (Berkeley Internet Name Daemon) is a server utility that implements the DNS (domain name service) protocol. It is widely used on the Internet. BIND version 9.3.0 is vulnerable to a denial of service attack, due to a logic error in the validator implemented in the 'authvalidator()' function. A remote attacker may exploit this vulnerability to cause the affected server to crash, denying service to legitimate users, when DNSSEC validation (which is off by default) is enabled.

* Note: This check solely relied on the version number of the remote BIND server to assess this vulnerability, so this might be a false positive.

* References:
http://www.isc.org/index.pl?/sw/bind/bind-security.php
http://www.kb.cert.org/vuls/id/938617
http://www.niscc.gov.uk/niscc/docs/al-20050125-00060.html?lang=en

* Platforms Affected:
ISC BIND 9.3.0
Linux Any version
Unix Any version
Recommendation Upgrade to the latest version of ISC BIND (9.3.1 or later), available from the Internet Software Consortium (ISC) Web site at http://www.isc.org/index.pl?/sw/bind/

ISC recommends that users that are unable to apply the patch turn off dnssec validation (which is off by default) at the options/view level.
The relevant BIND configuration directive is:

dnssec-enable no;
Related URL CVE-2005-0034 (CVE)
Related URL 12365 (SecurityFocus)
Related URL (ISS)