Lucene search

K
certCERTVU:510208
HistoryDec 01, 2010 - 12:00 a.m.

ISC BIND named allow-query vulnerability

2010-12-0100:00:00
www.kb.cert.org
18

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

0.024 Low

EPSS

Percentile

89.9%

Overview

ISC BIND contains a vulnerability in the processing of the allow-query access control specifier.

Description

According to ISC:

_When named is running as an authoritative server for a zone and receives a query for that zone data, it first checks for allow-query acls in the zone statement, then in that view, then in global options. If none of these exist, it defaults to allowing any query (allow-query {“any”};).
With this bug, if the allow-query is not set in the zone statement, it failed to check in view or global options and fell back to the default of allowing any query. This means that queries that the zone owner did not wish to allow were incorrectly allowed. _
This bug doesn’t affect allow-recursion or allow-query-cache acls, since they are not relevant to a zone for which the server is authoritative.


Impact

The configured acl is not correctly applied, allowing queries that the owner did not wish to allow.


Solution

**Apply an update

Users who obtain BIND from a third-party vendor, such as their operating system vendor, should see the vendor information portion of this document for a partial list of affected vendors. **
This vulnerability is addressed in ISC BIND version 9.7.2-P3. Users of BIND from the original source distribution should upgrade to this version.

See also <https://www.isc.org/software/bind/advisories/cve-2010-3615&gt;[](&lt;https://www.isc.org/software/bind/advisories/cve-2010-3613&gt;)


Vendor Information

510208

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

Internet Systems Consortium Affected

Updated: December 01, 2010

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

Vendor References

CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

Thanks to Internet Systems Consortium for reporting this vulnerability.

This document was written by Michael Orlando.

Other Information

CVE IDs: CVE-2010-3615
Severity Metric: 7.65 Date Public:

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

0.024 Low

EPSS

Percentile

89.9%