Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Application (Generic)  >   BIND Vendors:   ISC (Internet Software Consortium)
BIND Can Be Crashed By Remote Users Sending a Broken TSIG
SecurityTracker Alert ID:  1015993
SecurityTracker URL:
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Apr 26 2006
Impact:   Denial of service via network
Vendor Confirmed:  Yes  

Description:   A vulnerability was reported in BIND. A remote user can cause denial of service conditions.

A remote user can send a specially crafted transaction with an invalid Transaction Signature (TSIG) in the second or subsequent message to cause the target named service to crash.

The vendor indicates that the flaw is not "high-risk" because the remote user must first send a message with a correct TSIG.

The vulnerability was discovered using the PROTOS DNS Test Tool created by the Oulu University Secure Programming Group (OUSPG) from the University of Oulu in Finland. The tests generate invalid and/or abnormal packets.

The vulnerability was disclosed by the UK NISCC. The NISCC advisory is available at:

Impact:   A remote user can cause denial of service conditions.
Solution:   No solution was available at the time of this entry. The vendor plans to issue a fix in a future release.
Vendor URL: (Links to External Site)
Cause:   Exception handling error
Underlying OS:  Linux (Any), UNIX (Any)

Message History:   None.

 Source Message Contents

[Original Message Not Available for Viewing]

Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, LLC