Korean
<< Back
VID 19023
Severity 30
Port 53
Protocol UDP
Class DNS
Detailed Description According to its self-reported version number, the remote installation of BIND is potentially affected by a denial of service vulnerability. This issue only affects BIND installs that use the RPZ feature configured for RRset replacement. When RPZ is being used, a query of type RRSIG for a name configured for RRset replacement will trigger an assertion failure and cause the name server process to exit.

* Note: This check solely relied on the banner of the remote DNS server to assess this vulnerability, so this might be a false positive.

* References:
http://ftp.isc.org/isc/bind9/9.8.0-P1/RELEASE-NOTES-BIND-9.8.0-P1.html
https://www.isc.org/CVE-2011-1907

* Platforms Affected:
Internet Software Consortium, BIND version 9.8.0
Any operating system Any version
Recommendation Upgrade to the latest version of BIND (9.8.0-P1 or later), available from the Internet Software Consortium (ISC) Web site at http://www.isc.org/products/BIND/
Related URL CVE-2011-1907 (CVE)
Related URL 47734 (SecurityFocus)
Related URL (ISS)