Two vulnerabilities have been reported in BIND, which can be exploited by malicious people to bypass certain restrictions or cause a DoS (Denial of Service).
1) An error may allow access to the cache via recursion even though an ACL disallows it.
Successful exploitation requires BIND running as both authoritative and recursive DNS server in the same view.
2) An error when processing records from an authoritative server during DNSSEC query validation can be exploited to cause a server to crash via a bad signature in the response.
Successful exploitation requires BIND to be configured as a DNSSEC validating server with multiple trust anchors configured for the same zone.
The vulnerabilities are reported in version 9.7.2 through 9.7.2-P1.
Solution: Update to version 9.7.2-P2.
Provided and/or discovered by: 1) The vendor credits Alexandre Simon.
2) Reported by the vendor.
Original Advisory: https://lists.isc.org/pipermail/bind-announce/2010-September/000655.html
Do you have additional information related to this advisory?
Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this
information to email@example.com
Subject: BIND Denial of Service and Security Bypass Vulnerabilities
No posts yet
You must be logged in to post a comment.
Secunia Customer Login
Not a customer already?
Learn more about how our market leading Vulnerability Management solutions can help you manage risk and ensure compliance.