VID |
19063 |
Severity |
40 |
Port |
79 |
Protocol |
TCP,UDP |
Class |
DNS |
Detailed Description |
ISC BIND (Berkeley Internet Name Daemon) is a server utility that implements the DNS (domain name service) protocol. It is widely used on the Internet. According to its version number, BIND version 9.9.x prior to 9.9.9-P5, 9.9.9-S7 are affected by multiple vulnerabilities :
- A denial of service vulnerability exists in named due to a flaw that is triggered during the handling of a specially crafted answer packet in a response to an RTYPE ANY query. An unauthenticated, remote attacker can exploit this to cause an assertion failure and daemon exit. (CVE-2016-9131)
- A denial of service vulnerability exists in named in DNSSEC-enabled authoritative servers that is triggered during the handling of a query response that contains inconsistent DNSSEC information. An unauthenticated, remote attacker can exploit this to cause an assertion failure and daemon exit. (CVE-2016-9147)
- A denial of service vulnerability exists in named due to a flaw that is triggered during the handling of a specially crafted answer that contains a DS resource record. An unauthenticated, remote attacker can exploit this to cause an assertion failure and daemon exit. (CVE-2016-9444)
- A denial of service vulnerability exists in named in the nxdomain-redirect functionality that is triggered when handling a specially crafted query. An unauthenticated, remote attacker can exploit this to cause a REQUIRE assertion failure and daemon exit. (CVE-2016-9778)
* Note: This check solely relied on the banner of the remote DNS server to assess this vulnerability, so this might be a false positive.
* References: https://kb.isc.org/article/AA-01439 https://kb.isc.org/article/AA-01440 https://kb.isc.org/article/AA-01441 https://kb.isc.org/article/AA-01442
* Platforms Affected: Internet Software Consortium, BIND version 9.9.x < 9.9.9-P5, 9.9.9-S7 Any operating system Any version |
Recommendation |
Upgrade to the latest version of BIND (9.9.9-P5, 9.9.9-S7 or later), available from the Internet Software Consortium (ISC) Web site at http://www.isc.org/downloads/BIND/ |
Related URL |
CVE-2016-9131,CVE-2016-9147,CVE-2016-9444,CVE-2016-9778 (CVE) |
Related URL |
95386,95388,95390,95393 (SecurityFocus) |
Related URL |
(ISS) |
|