CERT-In Advisory
CIAD-2012-0048
ISC BIND RDATA Query Processing Remote Denial of Service Vulnerability
Original Issue Date: October 15, 2012
Severity Rating: High
Systems Affected
- ISC BIND 9.x before 9.7.6-P4
- ISC BIND 9.8.x before 9.8.3-P4
- ISC BIND 9.9.x before 9.9.1-P4
- ISC BIND 9.4-ESV and 9.6-ESV before 9.6-ESV-R7-P4
Overview
A vulnerability has been reported in ISC BIND which could allow a remote attacker to cause Denial of Service (DoS) condition.
Description
The vulnerability occurs when specific combinations of RDATA are loaded into a nameserver either via cache or an authoritative zone a subsequent query for a related record will cause named to lock up.
A remote attacker could use this flaw to cause a recursive resolver or an authoritative server in certain configurations to lockup, denying service to legitimate users.
Solution
Upgrade to the patched version or new release:
https://kb.isc.org/article/AA-00801
Workaround
- Setting the option 'minimal-responses' to 'yes' will prevent the lockup.
Vendor Information
ISC
https://kb.isc.org/article/AA-00801
References
ISC
https://kb.isc.org/article/AA-00801
Security Focus
http://www.securityfocus.com/bid/55852/
Secunia
http://secunia.com/advisories/50878
CVE Name
CVE-2012-5166
Disclaimer
The information provided herein is on "as is" basis, without warranty of any kind.
Contact Information
Email: info@cert-in.org.in Phone: +91-11-24368572
Postal address
Indian Computer Emergency Response Team (CERT-In) Ministry of Electronics and Information Technology Government of India Electronics Niketan 6, CGO Complex, Lodhi Road, New Delhi - 110 003 India
|