icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons_061

ISC BIND 9 Zero-Length RDATA Section Denial of Service / Information Disclosure

High

Synopsis

The remote DNS server may be affected by a denial of service / information disclosure vulnerability

Description

The remote host is running Bind, a popular name server.

Versions of BIND 9.6-ESV earlier than 9.6-ESV-R7-P1, 9.7.x earlier than 9.7.6-P1, 9.8.x earlier than 9.8.3-P1, and than 9.9.1-P1 are potentially affected by the following vulnerability. The remote installation of BIND does not properly handle resource records with a zero-length RDATA section, which may lead to unexpected outcomes, such as crashes of the affected server, disclosure of portions of memory, corrupted zone data, or other problems

Solution

Upgrade to BIND 9.6-ESV-R7-P1 / 9.7.6-P1 / 9.8.3-P1 / 9.9.1-P1 or later