VID |
19039 |
Severity |
30 |
Port |
53 |
Protocol |
UDP |
Class |
DNS |
Detailed Description |
ISC BIND (Berkeley Internet Name Daemon) is a server utility that implements the DNS (domain name service) protocol. It is widely used on the Internet. According to its version number, BIND version 9.7.x, 9.8.x, 9.9.6.x prior to 9.9.6-P2 are affected by a denial of service vulnerability due to an error relating to DNSSEC validation and the managed-keys feature. A remote attacker can trigger an incorrect trust-anchor management scenario in which no key is ready for use, resulting in an assertion failure and daemon crash.
* Note: This check solely relied on the banner of the remote DNS server to assess this vulnerability, so this might be a false positive.
* References: https://kb.isc.org/article/AA-01245/0/BIND-9.9.6-P2-Release-Notes.html https://kb.isc.org/article/AA-01235/0
* Platforms Affected: Internet Software Consortium, BIND version 9.7.x, 9.8.x, 9.9.6.x < 9.9.6-P2 Any operating system Any version |
Recommendation |
Upgrade to the latest version of BIND (9.9.6-P2 or later), available from the Internet Software Consortium (ISC) Web site at http://www.isc.org/downloads/BIND/ |
Related URL |
CVE-2015-1349 (CVE) |
Related URL |
72673 (SecurityFocus) |
Related URL |
(ISS) |
|