Korean
<< Back
VID 19054
Severity 40
Port 79
Protocol TCP,UDP
Class DNS
Detailed Description ISC BIND (Berkeley Internet Name Daemon) is a server utility that implements the DNS (domain name service) protocol. It is widely used on the Internet. According to its version number, the installation of ISC BIND on the remote name server is potentially affected by a denial of service vulnerability in files resolver.c and db.c when handling DNAME resource signatures. Annauthenticated, remote attacker can exploit this, via a crafted query that generates a response containing a signature record, to cause an assertion failure and daemon exit.

* Note: This check solely relied on the banner of the remote DNS server to assess this vulnerability, so this might be a false positive.

* References:
https://kb.isc.org/article/AA-01353/
https://kb.isc.org/article/AA-01362/

* Platforms Affected:
Internet Software Consortium, BIND version 9.9.8-Px < 9.9.8-P4
Internet Software Consortium, BIND version 9.9.8-Sx < 9.9.8-S6
Internet Software Consortium, BIND version 9.10.x < 9.10.3-P4
Any operating system Any version
Recommendation Upgrade to the latest version of BIND (9.9.8-P4 or 9.9.8-S6 or 9.10.3-P4 or later), available from the Internet Software Consortium (ISC) Web site at http://www.isc.org/downloads/BIND/
Related URL CVE-2016-1286 (CVE)
Related URL (SecurityFocus)
Related URL (ISS)