BIND AXFR/IXFR Response Processing Flaw Lets Remote DNS Servers to Cause the Target DNS Service to Crash
|
SecurityTracker Alert ID: 1036241 |
SecurityTracker URL: http://securitytracker.com/id/1036241
|
CVE Reference:
CVE-2016-6170
(Links to External Site)
|
Date: Jul 7 2016
|
Impact:
Denial of service via network
|
|
Version(s): 9.x - 9.10.4-P1
|
Description:
A vulnerability was reported in BIND. A remote user can cause the target service to crash.
A remote primary DNS server can send a specially crafted AXFR response or IXFR response to cause the target secondary DNS server to crash.
A remote authenticated user may be able to send a specially crafted UPDATE message to cause the target primary DNS server to crash.
The original advisory is available at:
http://dnsops.jp/event/20160624/zone-axfr.pdf
Toshifumi Sakaguchi reported this vulnerability at DNS Summer Day 2016.
|
Impact:
A remote primary DNS server can cause the target secondary DNS server to crash.
|
Solution:
No solution was available at the time of this entry.
[Editor's note: An unofficial, third-party patch is available at: https://github.com/sischkg/xfer-limit]
|
Vendor URL: www.isc.org/downloads/bind/ (Links to External Site)
|
Cause:
Resource error
|
Underlying OS: Linux (Any), UNIX (Any)
|
|
Message History:
None.
|
Source Message Contents
|
|
[Original Message Not Available for Viewing]
|
|