VID |
19067 |
Severity |
40 |
Port |
79 |
Protocol |
TCP,UDP |
Class |
DNS |
Detailed Description |
ISC BIND (Berkeley Internet Name Daemon) is a server utility that implements the DNS (domain name service) protocol. It is widely used on the Internet. According to its version number, BIND version 9.10.x prior to 9.10.4-P6 are affected by a denial of service vulnerability in the query_find() function in query.c that is triggered when using DNS64 and RPZ simultaneously for rewriting query responses. An unauthenticated, remote attacker can exploit this to cause an INSIST assertion failure or a NULL pointer read, resulting in a termination of the service.
* Note: This check solely relied on the banner of the remote DNS server to assess this vulnerability, so this might be a false positive.
* References: https://kb.isc.org/article/AA-01453
* Platforms Affected: Internet Software Consortium, BIND version 9.10.x < 9.10.4-P6 Any operating system Any version |
Recommendation |
Upgrade to the latest version of BIND (9.10.4-P6 or later), available from the Internet Software Consortium (ISC) Web site at http://www.isc.org/downloads/BIND/ |
Related URL |
CVE-2017-3135 (CVE) |
Related URL |
(SecurityFocus) |
Related URL |
(ISS) |
|