Korean
<< Back
VID 19051
Severity 30
Port 79
Protocol TCP,UDP
Class DNS
Detailed Description ISC BIND (Berkeley Internet Name Daemon) is a server utility that implements the DNS (domain name service) protocol. It is widely used on the Internet. According to its version number, BIND version 9.10.x prior to 9.10.3-P3 are affected by multiple vulnerabilities :

- A denial of service vulnerability exists due to improper handling of certain string formatting options. An authenticated, remote attacker can exploit this, via a malformed Address Prefix List (APL) record, to cause an INSIST assertion failure and daemon exist. (CVE-2015-8704)

- A denial of service vulnerability exists due to a failure to properly convert OPT records and ECS options to formatted text. A remote attacker can exploit this to cause a REQUIRE assertion failure and daemon exit. (CVE-2015-8705)

* Note: This check solely relied on the banner of the remote DNS server to assess this vulnerability, so this might be a false positive.

* References:
https://kb.isc.org/article/AA-01287
https://kb.isc.org/article/AA-01291

* Platforms Affected:
Internet Software Consortium, BIND version 9.10.x < 9.10.3-P3
Any operating system Any version
Recommendation Upgrade to the latest version of BIND (9.10.3-P3 or later), available from the Internet Software Consortium (ISC) Web site at http://www.isc.org/downloads/BIND/
Related URL CVE-2015-8704,CVE-2015-8705 (CVE)
Related URL (SecurityFocus)
Related URL (ISS)