VID |
19024 |
Severity |
40 |
Port |
53 |
Protocol |
UDP |
Class |
DNS |
Detailed Description |
ISC BIND (Berkeley Internet Name Daemon) is a server utility that implements the DNS (domain name service) protocol. It is widely used on the Internet. According to its self-reported version number, the remote installation of BIND is potentially affected by a denial of service vulnerability. If BIND queries a domain with large RRSIG resource record sets it may trigger an assertion failure and cause the name server process to crash due to an off-by-one error in a buffer size check.
* Note: This check solely relied on the banner of the remote DNS server to assess this vulnerability, so this might be a false positive.
* References: http://ftp.isc.org/isc/bind9/9.4-ESV-R4-P1/RELEASE-NOTES-BIND-9.4-ESV-R4-P1.html http://ftp.isc.org/isc/bind9/9.6-ESV-R4-P1/RELEASE-NOTES-BIND-9.6-ESV-R4-P1.html http://ftp.isc.org/isc/bind9/9.7.3-P1/RELEASE-NOTES-BIND-9.7.3-P1.html http://ftp.isc.org/isc/bind9/9.8.0-P2/RELEASE-NOTES-BIND-9.8.0-P2.html https://www.isc.org/software/bind/advisories/cve-2011-1910
* Platforms Affected: Internet Software Consortium, BIND 9.x before 9.7.3-P1, 9.8.x before 9.8.0-P2, 9.4-ESV before 9.4-ESV-R4-P1, and 9.6-ESV before 9.6-ESV-R4-P1 Any operating system Any version |
Recommendation |
Upgrade to the latest version of BIND (9.7.3-P1/9.8.0-P2/9.4-ESV-R4-P1/9.6-ESV-R4-P1 or later), available from the Internet Software Consortium (ISC) Web site at http://www.isc.org/products/BIND/ |
Related URL |
CVE-2011-1910 (CVE) |
Related URL |
48007 (SecurityFocus) |
Related URL |
(ISS) |
|