SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   BIND Vendors:   ISC (Internet Software Consortium)
BIND AXFR/IXFR Response Processing Flaw Lets Remote DNS Servers to Cause the Target DNS Service to Crash
SecurityTracker Alert ID:  1036241
SecurityTracker URL:  http://securitytracker.com/id/1036241
CVE Reference:   CVE-2016-6170   (Links to External Site)
Date:  Jul 7 2016
Impact:   Denial of service via network

Version(s): 9.x - 9.10.4-P1
Description:   A vulnerability was reported in BIND. A remote user can cause the target service to crash.

A remote primary DNS server can send a specially crafted AXFR response or IXFR response to cause the target secondary DNS server to crash.

A remote authenticated user may be able to send a specially crafted UPDATE message to cause the target primary DNS server to crash.

The original advisory is available at:

http://dnsops.jp/event/20160624/zone-axfr.pdf

Toshifumi Sakaguchi reported this vulnerability at DNS Summer Day 2016.

Impact:   A remote primary DNS server can cause the target secondary DNS server to crash.
Solution:   No solution was available at the time of this entry.

[Editor's note: An unofficial, third-party patch is available at: https://github.com/sischkg/xfer-limit]

Vendor URL:  www.isc.org/downloads/bind/ (Links to External Site)
Cause:   Resource error
Underlying OS:  Linux (Any), UNIX (Any)

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC