Korean
<< Back
VID 19064
Severity 40
Port 79
Protocol TCP,UDP
Class DNS
Detailed Description ISC BIND (Berkeley Internet Name Daemon) is a server utility that implements the DNS (domain name service) protocol. It is widely used on the Internet. According to its version number, BIND version 9.10.x prior to 9.10.4-P5 are affected by multiple vulnerabilities :

- A denial of service vulnerability exists in named due to a flaw that is triggered during the handling of a specially crafted answer packet in a response to an RTYPE ANY query. An unauthenticated, remote attacker can exploit this to cause an assertion failure and daemon exit. (CVE-2016-9131)

- A denial of service vulnerability exists in named in DNSSEC-enabled authoritative servers that is triggered during the handling of a query response that contains inconsistent DNSSEC information. An unauthenticated, remote attacker can exploit this to cause an assertion failure and daemon exit. (CVE-2016-9147)

- A denial of service vulnerability exists in named due to a flaw that is triggered during the handling of a specially crafted answer that contains a DS resource record. An unauthenticated, remote attacker can exploit this to cause an assertion failure and daemon exit. (CVE-2016-9444)

- A denial of service vulnerability exists in named in the nxdomain-redirect functionality that is triggered when handling a specially crafted query. An unauthenticated, remote attacker can exploit this to cause a REQUIRE assertion failure and daemon exit. (CVE-2016-9778)

* Note: This check solely relied on the banner of the remote DNS server to assess this vulnerability, so this might be a false positive.

* References:
https://kb.isc.org/article/AA-01439
https://kb.isc.org/article/AA-01440
https://kb.isc.org/article/AA-01441
https://kb.isc.org/article/AA-01442

* Platforms Affected:
Internet Software Consortium, BIND version 9.10.x < 9.10.4-P5
Any operating system Any version
Recommendation Upgrade to the latest version of BIND (9.10.4-P5 or later), available from the Internet Software Consortium (ISC) Web site at http://www.isc.org/downloads/BIND/
Related URL CVE-2016-9131,CVE-2016-9147,CVE-2016-9444,CVE-2016-9778 (CVE)
Related URL 95386,95388,95390,95393 (SecurityFocus)
Related URL (ISS)