Korean
<< Back
VID 19040
Severity 30
Port 53
Protocol UDP
Class DNS
Detailed Description ISC BIND (Berkeley Internet Name Daemon) is a server utility that implements the DNS (domain name service) protocol. It is widely used on the Internet.
According to its version number, BIND version 9.9.6-S2 is affected by a denial of service vulnerability due to an error relating to DNSSEC validation and the managed-keys feature. A remote attacker can trigger an incorrect trust-anchor management scenario in which no key is ready for use, resulting in an assertion failure and daemon crash.

* Note: This check solely relied on the banner of the remote DNS server to assess this vulnerability, so this might be a false positive.

* References:
http://www.dns-co.com/solutions/
https://kb.isc.org/article/AA-01235/0
https://kb.isc.org/article/AA-00913/0/BIND-9-Security-Vulnerability-Matrix.html

* Platforms Affected:
Internet Software Consortium, BIND version 9.9.6-S2
Any operating system Any version
Recommendation Upgrade to the latest version of BIND (9.9.6-S3 or later), available from the Internet Software Consortium (ISC) Web site at http://www.isc.org/downloads/BIND/
Related URL CVE-2015-1349 (CVE)
Related URL 72673 (SecurityFocus)
Related URL (ISS)