Lucene search

K
certCERTVU:739123
HistoryJun 04, 2002 - 12:00 a.m.

ISC BIND 9 fails to process additional data chains in responses correctly thereby causing the server to fail an internal consistency check

2002-06-0400:00:00
www.kb.cert.org
14

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.112 Low

EPSS

Percentile

95.2%

Overview

A denial-of-service vulnerability exists in version 9 of the Internet Software Consortium’s (ISC) Berkeley Internet Name Domain (BIND) server. ISC BIND versions 8 and 4 are not affected. Exploiting this vulnerability will cause vulnerable BIND servers to shut down.

Description

BIND is an implementation of the Domain Name System (DNS) that is maintained by the ISC. A vulnerability in Version 9 of BIND exists which may result in the deliberate shutdown of vulnerable BIND servers by arbitrary remote attackers. The shutdown can be caused by a specific DNS packet designed to create an improperly-handled error condition. Because the error condition is correctly detected but is not handled properly, this vulnerability will not allow an intruder to execute arbitrary code or write data to arbitrary locations in memory. The error condition that triggers the shutdown occurs when the rdataset parameter to the dns_message_findtype() function in message.c is not NULL as expected. The condition causes the code to assert an error message and call abort() to shutdown the BIND server.


Impact

Exploitation of this vulnerability will cause the vulnerable BIND server to abort and shut down. As a result, the BIND server will not be available unless restarted.


Solution

Apply a patch from your vendor or upgrade to BIND 9.2.1. BIND 9.2.1 is available from <http://www.isc.org/products/BIND/bind9.html&gt;.


Vendor Information

739123

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

F5 Networks __ Affected

Notified: May 30, 2002 Updated: June 11, 2002

Status

Affected

Vendor Statement

EDGE-FX contains a vulnerable version of BIND 9. Instructions for obtaining and installing a patch are available at <ftp://ftp.f5.com/Domestic/Edgefx/named_patch/cert_patch_6_2002.html&gt;.

All other F5 Networks products contain BIND 8.2, and are therefore not affected by this vulnerability.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23739123 Feedback>).

Hewlett-Packard Company __ Affected

Notified: May 30, 2002 Updated: August 08, 2002

Status

Affected

Vendor Statement

HEWLETT-PACKARD COMPANY SECURITY BULLETIN: HPSBUX0207-202

Originally issued: 22 July 2002

HP Published Security Bulletin HPSBUX0207-202 with solutions for HP9000 Series 700/800 running HP-UX release 11.11 (11i) only with the BINDv920.INETSVCS-BIND fileset installed.

This bulletin is available from the HP IT Resource Center page at: http://itrc.hp.com “Maintenance and Support” then “Support Information Digests” and then “hp security bulletins archive” search for bulletin HPSBUX0207-202.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23739123 Feedback>).

ISC __ Affected

Updated: May 30, 2002

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC urges users to upgrade to BIND version 9.2.1, available from <http://www.isc.org/products/BIND/bind9.html&gt;.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23739123 Feedback>).

MandrakeSoft __ Affected

Notified: May 30, 2002 Updated: June 03, 2002

Status

Affected

Vendor Statement

Mandrake Linux 8.x ships with BIND9 and as such updated packages will be available as early as possible.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23739123 Feedback>).

NetBSD __ Affected

Notified: May 30, 2002 Updated: June 04, 2002

Status

Affected

Vendor Statement

NetBSD has not included Bind 9 in the base system of any release or -current development branch.

Bind 9 is available from the 3rd party software system, pkgsrc. Users who have installed net/bind9 or net/bind9-current should update to a fixed version. pkgsrc/security/audit-packages can be used to keep up to date with these types of issues.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23739123 Feedback>).

Red Hat Inc. __ Affected

Notified: May 30, 2002 Updated: June 03, 2002

Status

Affected

Vendor Statement

Red Hat distributed BIND 9 in Red Hat Linux versions 7.1, 7.2, and 7.3. We are currently working on producing errata packages, when complete these will be available along with our advisory at the URL below. At the same time users of the Red Hat Network will be able to update their systems using the ‘up2date’ tool.

<http://rhn.redhat.com/errata/RHSA-2002-105.html&gt;

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23739123 Feedback>).

SuSE Inc. __ Affected

Notified: May 30, 2002 Updated: June 03, 2002

Status

Affected

Vendor Statement

We are affected by the bind9 DoS issue as well. All of our currently supported SuSE Linux products come with a bind9 package. We will release an announcement for the issue, coordinated with your timeframe and not before we see your official announcement.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23739123 Feedback>).

The SCO Group (SCO UnixWare) __ Affected

Notified: May 30, 2002 Updated: September 13, 2002

Status

Affected

Vendor Statement

SCO OpenServer from Caldera does not ship BIND9, and is therefore not vulnerable.

Caldera Open UNIX does ship BIND9, and is vulnerable. We are investigating.

Caldera OpenLinux does not ship BIND9, and is therefore not vulnerable.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23739123 Feedback>).

Alcatel __ Not Affected

Notified: May 30, 2002 Updated: September 18, 2002

Status

Not Affected

Vendor Statement

In relation to this CERT advisory on security vulnerabilities with ISC BIND 9 implementation, Alcatel has conducted an immediate assessment to determine any impact this may have on our portfolio. An initial analysis has shown that none of our products is affected when used as delivered to customers. The security of our customers’ networks is of highest priority for Alcatel. Therefore, investigations are going on, in particular for the UMTS GPRS Core Network portfolio, to determine any impact. Updates will be provided if necessary. Customers may contact their Alcatel support representative for more details.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23739123 Feedback>).

Apple Computer Inc. __ Not Affected

Notified: May 30, 2002 Updated: May 31, 2002

Status

Not Affected

Vendor Statement

The version of BIND that ships in Mac OS X and Mac OS X Server does not contain this vulnerability.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23739123 Feedback>).

BSDI __ Not Affected

Notified: May 30, 2002 Updated: June 04, 2002

Status

Not Affected

Vendor Statement

Wind River Systems, Inc. does not include BIND 9 with any version of BSD/OS.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23739123 Feedback>).

Compaq Computer Corporation __ Not Affected

Notified: May 30, 2002 Updated: June 04, 2002

Status

Not Affected

Vendor Statement

HP Alpha Server Products:

HP Tru64 UNIX:
Tru64 UNIX is not vulnerable to this reported problem. HP Tru64 UNIX ships with BIND 8.2.2-p5

TCP/IP for HP OpenVms:
TCP/IP for HP OpenVms is not vulnerable to this reported problem. The current versions of TCP/IP for HP OpenVMS ship BIND 8.2.2-p5

HP NonStop Server:
“HP NonStop Himalaya is not vulnerable to this problem. The ‘named’ function of Domain Name Server (T6021) which is implemented for HP NonStop Himalaya is based on BIND 4.8. NonStop DNS is the only Himalaya software product that includes ‘named’.”

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23739123 Feedback>).

Cray Inc. __ Not Affected

Notified: May 30, 2002 Updated: May 30, 2002

Status

Not Affected

Vendor Statement

Cray, Inc. is not vulnerable since the BIND distributed with Unicos and Unicos/mk is not based on BIND 9.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23739123 Feedback>).

Engarde __ Not Affected

Notified: May 30, 2002 Updated: May 30, 2002

Status

Not Affected

Vendor Statement

Guardian Digital does not ship BIND 9 in any versions of EnGarde Secure Linux, therefore we are not vulnerable. All versions were shipped with BIND 8.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23739123 Feedback>).

FreeBSD __ Not Affected

Notified: May 30, 2002 Updated: May 30, 2002

Status

Not Affected

Vendor Statement

The FreeBSD base system does not ship with ISC BIND 9. However, ISC BIND 9 is available in the FreeBSD Ports Collection. It is currently at version 9.2.1 and is therefore unaffected.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23739123 Feedback>).

IBM __ Not Affected

Notified: May 30, 2002 Updated: June 04, 2002

Status

Not Affected

Vendor Statement

After analysis of the affected component, IBM has determined that the AIX bind deamon is not vulnerable to the attack as described in the CERT advisory.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23739123 Feedback>).

Inktomi Corporation __ Not Affected

Updated: June 11, 2002

Status

Not Affected

Vendor Statement

Inktomi Inktomi Traffic Server DNS proxy does not include BIND9 and is therefore not vulnerable.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23739123 Feedback>).

Microsoft Corporation __ Not Affected

Notified: May 30, 2002 Updated: May 30, 2002

Status

Not Affected

Vendor Statement

Microsoft has reviewed the information and can confirm that our products are not affected by this vulnerability.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23739123 Feedback>).

NEC Corporation __ Not Affected

Notified: May 30, 2002 Updated: June 03, 2002

Status

Not Affected

Vendor Statement

sent on June 3, 2002

[Server Products]

  • EWS/UP 48 Series operating system
    - is NOT vulnerable.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23739123 Feedback>).

Network Appliance __ Not Affected

Notified: May 30, 2002 Updated: June 03, 2002

Status

Not Affected

Vendor Statement

All NetApp products do not contain any BIND code, so no NetApp product is vulnerable to this problem.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23739123 Feedback>).

SGI __ Not Affected

Notified: May 30, 2002 Updated: May 30, 2002

Status

Not Affected

Vendor Statement

IRIX does not ship with BIND9 and is not vulnerable.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23739123 Feedback>).

Sun Microsystems Inc. __ Not Affected

Notified: May 30, 2002 Updated: May 31, 2002

Status

Not Affected

Vendor Statement

Sun does not ship BIND 9 with any version of Solaris at this time and is therefore not affected by this issue.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23739123 Feedback>).

Unisphere Networks __ Not Affected

Notified: May 30, 2002 Updated: May 30, 2002

Status

Not Affected

Vendor Statement

The Unisphere Networks ERX family of edge routers does not implement a DNS server or named daemon within the Unison OS. Additionally, the DNS client found on the ERX is not based on the ISC BIND code. Unisphere Networks has no reason to expect a similar problem exists in the DNS client implementation found on the ERX.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23739123 Feedback>).

djbdns __ Not Affected

Notified: June 04, 2002 Updated: June 11, 2002

Status

Not Affected

Vendor Statement

djbdns does not have this bug. Unlike BIND 9, djbdns does not commit hara-kiri when an attacker tries to confuse it, or pokes it sharply, or simply thinks bad thoughts in its general direction. djbdns has never used any BIND-derived code. See <http://cr.yp.to/djbdns.html&gt;.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23739123 Feedback>).

3Com Unknown

Notified: May 30, 2002 Updated: May 30, 2002

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23739123 Feedback>).

AT&T Unknown

Notified: May 30, 2002 Updated: May 30, 2002

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23739123 Feedback>).

Cisco Systems Inc. Unknown

Notified: May 30, 2002 Updated: May 30, 2002

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23739123 Feedback>).

Data General Unknown

Notified: May 30, 2002 Updated: May 30, 2002

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23739123 Feedback>).

Debian Unknown

Notified: May 30, 2002 Updated: May 30, 2002

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23739123 Feedback>).

Fujitsu Unknown

Notified: May 30, 2002 Updated: May 30, 2002

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23739123 Feedback>).

IBM-zSeries Unknown

Notified: May 30, 2002 Updated: May 30, 2002

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23739123 Feedback>).

Intel Unknown

Notified: May 30, 2002 Updated: May 30, 2002

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23739123 Feedback>).

Juniper Networks Unknown

Notified: May 30, 2002 Updated: May 30, 2002

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23739123 Feedback>).

Lucent Unknown

Notified: May 30, 2002 Updated: May 30, 2002

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23739123 Feedback>).

Nortel Networks __ Unknown

Notified: May 30, 2002 Updated: June 04, 2002

Status

Unknown

Vendor Statement

Nortel Networks is reviewing its portfolio to determine if any products are affected by the vulnerability noted in CERT Advisory CA-2002-15. A definitive statement will be issued shortly.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23739123 Feedback>).

OpenBSD Unknown

Notified: May 30, 2002 Updated: May 30, 2002

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23739123 Feedback>).

Sequent Unknown

Notified: May 30, 2002 Updated: May 30, 2002

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23739123 Feedback>).

Sony Corporation Unknown

Notified: May 30, 2002 Updated: May 30, 2002

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23739123 Feedback>).

Unisys Unknown

Notified: May 30, 2002 Updated: May 30, 2002

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23739123 Feedback>).

Wind River Systems Inc. Unknown

Notified: May 30, 2002 Updated: May 30, 2002

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23739123 Feedback>).

View all 40 vendors __View less vendors __

CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

The CERT/CC thanks the Internet Software Consortium (ISC) for reporting this vulnerability to us.

This document was written by Ian A. Finlay.

Other Information

CVE IDs: CVE-2002-0400
CERT Advisory: CA-2002-15 Severity Metric:

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.112 Low

EPSS

Percentile

95.2%