Lucene search

K
archlinuxArch LinuxASA-201512-10
HistoryDec 16, 2015 - 12:00 a.m.

bind: denial of service

2015-12-1600:00:00
Arch Linux
lists.archlinux.org
27

6.9 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:C/I:C/A:C

0.963 High

EPSS

Percentile

99.4%

An error in the parsing of incoming responses allows some records with
an incorrect class to be accepted by BIND instead of being rejected as
malformed. This can trigger a REQUIRE assertion failure when those
records are subsequently cached. Intentional exploitation of this
condition is possible and could be used as a denial-of-service vector
against servers performing recursive queries.

An attacker who can cause a server to request a record with a malformed
class attribute can use this bug to trigger a REQUIRE assertion in db.c,
causing named to exit and denying service to clients. The risk to
recursive servers is high. Authoritative servers are at limited risk if
they perform authentication when making recursive queries to resolve
addresses for servers listed in NS RRSETs.

OSVersionArchitecturePackageVersionFilename
anyanyanybind< 9.10.3.P2-1UNKNOWN

6.9 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:C/I:C/A:C

0.963 High

EPSS

Percentile

99.4%