VID |
19051 |
Severity |
30 |
Port |
79 |
Protocol |
TCP,UDP |
Class |
DNS |
Detailed Description |
ISC BIND (Berkeley Internet Name Daemon) is a server utility that implements the DNS (domain name service) protocol. It is widely used on the Internet. According to its version number, BIND version 9.10.x prior to 9.10.3-P3 are affected by multiple vulnerabilities :
- A denial of service vulnerability exists due to improper handling of certain string formatting options. An authenticated, remote attacker can exploit this, via a malformed Address Prefix List (APL) record, to cause an INSIST assertion failure and daemon exist. (CVE-2015-8704)
- A denial of service vulnerability exists due to a failure to properly convert OPT records and ECS options to formatted text. A remote attacker can exploit this to cause a REQUIRE assertion failure and daemon exit. (CVE-2015-8705)
* Note: This check solely relied on the banner of the remote DNS server to assess this vulnerability, so this might be a false positive.
* References: https://kb.isc.org/article/AA-01287 https://kb.isc.org/article/AA-01291
* Platforms Affected: Internet Software Consortium, BIND version 9.10.x < 9.10.3-P3 Any operating system Any version |
Recommendation |
Upgrade to the latest version of BIND (9.10.3-P3 or later), available from the Internet Software Consortium (ISC) Web site at http://www.isc.org/downloads/BIND/ |
Related URL |
CVE-2015-8704,CVE-2015-8705 (CVE) |
Related URL |
(SecurityFocus) |
Related URL |
(ISS) |
|