Korean
<< Back
VID 19026
Severity 40
Port 53
Protocol UDP
Class DNS
Detailed Description ISC BIND (Berkeley Internet Name Daemon) is a server utility that implements the DNS (domain name service) protocol. It is widely used on the Internet.
According to its self-reported version number, the remote installation of BIND is potentially affected by a denial of service vulnerability. If an attacker sends a specially crafted request to a BIND server it may cause the name server process to crash.

* Note: This check solely relied on the banner of the remote DNS server to assess this vulnerability, so this might be a false positive.

* References:
ftp://ftp.isc.org/isc/bind/9.6-ESV-R4-P3/RELEASE-NOTES-BIND-9.6-ESV-R4-P3.html
ftp://ftp.isc.org/isc/bind/9.7.3-P3/RELEASE-NOTES-BIND-9.7.3-P3.html
ftp://ftp.isc.org/isc/bind/9.8.0-P4/RELEASE-NOTES-BIND-9.8.0-P4.html
http://www.isc.org/software/bind/advisories/cve-2011-2464

* Platforms Affected:
Internet Software Consortium, BIND before 9.6-ESV-R4-P3 / 9.7.3-P3 / 9.8.0-P4
Any operating system Any version
Recommendation Upgrade to the latest version of BIND (9.6-ESV-R4-P3 / 9.7.3-P3 / 9.8.0-P4 or later), available from the Internet Software Consortium (ISC) Web site at http://www.isc.org/products/BIND/
Related URL CVE-2011-2464 (CVE)
Related URL 48566 (SecurityFocus)
Related URL (ISS)