Lucene search

K
freebsdFreeBSD83725C91-7C7E-11DE-9672-00E0815B8DA8
HistoryJul 28, 2009 - 12:00 a.m.

BIND -- Dynamic update message remote DoS

2009-07-2800:00:00
vuxml.freebsd.org
10

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

0.965 High

EPSS

Percentile

99.6%

Problem Description:
When named(8) receives a specially crafted dynamic update
message an internal assertion check is triggered which causes
named(8) to exit.
To trigger the problem, the dynamic update message must contains
a record of type β€œANY” and at least one resource record set (RRset)
for this fully qualified domain name (FQDN) must exist on the
server.
Impact:
An attacker which can send DNS requests to a nameserver can cause
it to exit, thus creating a Denial of Service situation.
Workaround:
No generally applicable workaround is available, but some firewalls
may be able to prevent nsupdate DNS packets from reaching the
nameserver.
NOTE WELL: Merely configuring named(8) to ignore dynamic updates
is NOT sufficient to protect it from this vulnerability.

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

0.965 High

EPSS

Percentile

99.6%