Lucene search

K
certCERTVU:559980
HistoryFeb 22, 2011 - 12:00 a.m.

ISC Bind 9 IXFR or DDNS update combined with high query rate DoS vulnerability

2011-02-2200:00:00
www.kb.cert.org
11

7.1 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:N/I:N/A:C

0.094 Low

EPSS

Percentile

94.8%

Overview

A denial-of-service condition exists in certain cases when an ISC Bind server processes a IXFR transfer or dynamic update.

Description

The ISC security advisory states:

β€œWhen an authoritative server processes a successful IXFR transfer or a dynamic update, there is a small window of time during which the IXFR/update coupled with a query may cause a deadlock to occur. This deadlock will cause the server to stop processing all requests. A high query rate and/or a high update rate will increase the probability of this condition.”


Impact

An attacker may cause the Bind server to stop processing all requests.


Solution

BIND 9.7.1 or 9.7.2 users should upgrade to BIND 9.7.3. Earlier versions are not vulnerable. BIND 9.5 is End of Life and is not supported by ISC. BIND 9.8 is not vulnerable.


The ISC advisory contains the following workaround:
β€œDepending on your performance requirements, a work-around may be available. ISC was not able to reproduce this defect in 9.7.2 using -n 1, which causes named to use only one worker thread, thus avoiding the deadlock. If your server is powerful enough to serve your data with a single processor, this option may be fast to implement until you have time to perform an upgrade.”


Vendor Information

559980

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

Internet Systems Consortium Affected

Notified: January 24, 2011 Updated: February 23, 2011

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

<http://www.isc.org/software/bind/advisories/cve-2011-0414&gt;

Acknowledgements

Thanks to ISC for reporting this vulnerability.

This document was written by Jared Allar.

Other Information

CVE IDs: CVE-2011-0414
Severity Metric: 4.50 Date Public:

7.1 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:N/I:N/A:C

0.094 Low

EPSS

Percentile

94.8%