| VID |
19048 |
| Severity |
40 |
| Port |
79 |
| Protocol |
TCP,UDP |
| Class |
DNS |
| Detailed Description |
ISC BIND (Berkeley Internet Name Daemon) is a server utility that implements the DNS (domain name service) protocol. It is widely used on the Internet. According to its version number, BIND version 9.10.2.x prior to 9.10.2-P4 are affected by multiple vulnerabilities :
- A denial of service vulnerability exists due to an assertion flaw that is triggered when parsing malformed DNSSEC keys. An unauthenticated, remote attacker can exploit this, via a specially crafted query to a zone containing such a key, to cause a validating resolver to exit. (CVE-2015-5722)
- A denial of service vulnerability exists in the fromwire_openpgpkey() function in openpgpkey_61.c that is triggered when the length of data is less than 1. An unauthenticated, remote attacker can exploit this, via a specially crafted response to a query, to cause an assertion failure that terminates named. (CVE-2015-5986)
* Note: This check solely relied on the banner of the remote DNS server to assess this vulnerability, so this might be a false positive.
* References: https://kb.isc.org/article/AA-01287 https://kb.isc.org/article/AA-01291
* Platforms Affected: Internet Software Consortium, BIND version 9.10.2.x < 9.10.2-P4 Any operating system Any version |
| Recommendation |
Upgrade to the latest version of BIND (9.10.2-P4 or later), available from the Internet Software Consortium (ISC) Web site at http://www.isc.org/downloads/BIND/ |
| Related URL |
CVE-2015-5722,CVE-2015-5986 (CVE) |
| Related URL |
(SecurityFocus) |
| Related URL |
(ISS) |
|