Korean
<< Back
VID 19020
Severity 30
Port 53
Protocol TCP,UDP
Class DNS
Detailed Description The BIND daemon, according to its version number, has multiple denial of service vulnerabilities. ISC BIND (Berkeley Internet Name Daemon) is a server utility that implements the DNS (domain name service) protocol. It is widely used on the Internet. BIND versions prior to 9.2.6-P1 and 9.3.x prior to 9.3.2-P1 and 9.4.x prior to 9.4.0b2 are vulnerable to multiple denial of service vulnerabilities, caused by improper handling of recursive queries and DNS Security Extensions (DNSSEC) signed Resource Record Sets (RRsets). A remote attacker could exploit these vulnerabilities to cause the service to crash.

* Note: This check solely relied on the banner of the remote DNS server to assess this vulnerability, so this might be a false positive.

* References:
http://www.isc.org/products/BIND/
http://www.isc.org/index.pl?/sw/bind/bind-security.php
http://www.niscc.gov.uk/niscc/docs/re-20060905-00590.pdf?lang=en
http://www.kb.cert.org/vuls/id/697164
http://www.kb.cert.org/vuls/id/915404

* Platforms Affected:
Internet Software Consortium, BIND versions 9.2.x prior to 9.2.6-P1 or 9.2.7rc2
Internet Software Consortium, BIND versions 9.3.x prior to 9.3.2-P1 or 9.3.3rc2
Internet Software Consortium, BIND versions 9.4.x prior to 9.4.0b2
Any operating system Any version
Recommendation Upgrade to the latest version of BIND (9.4.0b2 / 9.3.3rc2 / 9.3.2-P1 / 9.2.7rc2 / 9.2.6-P1 or later), available from the Internet Software Consortium (ISC) Web site at http://www.isc.org/products/BIND/

For Debian GNU/Linux:
Upgrade to the fixed version of BIND, as listed in Debian Security Advisory DSA-1172-1 at http://www.debian.org/security/2006/dsa-1172

For Gentoo Linux:
Upgrade to the fixed version of BIND, as listed in Gentoo Linux Security Announcement GLSA 200609-11 at http://www.gentoo.org/security/en/glsa/glsa-200609-11.xml
Related URL CVE-2006-4095,CVE-2006-4096 (CVE)
Related URL 19859 (SecurityFocus)
Related URL 28744,28745 (ISS)