Korean
<< Back
VID 19057
Severity 30
Port 79
Protocol TCP,UDP
Class DNS
Detailed Description ISC BIND (Berkeley Internet Name Daemon) is a server utility that implements the DNS (domain name service) protocol. It is widely used on the Internet. According to its version number, BIND version 9.10.x prior to 9.10.4-P2 are affected by an error in the lightweight resolver (lwres) protocol implementation when resolving a query name that, when combined with a search list entry, exceeds the maximum allowable length. An unauthenticated, remote attacker can exploit this to cause a segmentation fault, resulting in a denial of service condition. This issue occurs when lwresd or the the named 'lwres' option is enabled.

* Note: This check solely relied on the banner of the remote DNS server to assess this vulnerability, so this might be a false positive.

* References:
https://kb.isc.org/article/AA-01393

* Platforms Affected:
Internet Software Consortium, BIND version 9.10.x < 9.10.4-P2
Any operating system Any version
Recommendation Upgrade to the latest version of BIND (9.10.4-P2 or later), available from the Internet Software Consortium (ISC) Web site at http://www.isc.org/downloads/BIND/
Related URL CVE-2016-2775 (CVE)
Related URL (SecurityFocus)
Related URL (ISS)