Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

ISC BIND 9.x < 9.9.8-P3 / 9.9.8-S4 / 9.9.9-S3 / 9.10.3-P3 DoS

Medium

Synopsis

The remote DNS server may be affected by a Denial of Service (DoS) attack vector.

Description

Versions of ISC BIND 9.x prior to 9.9.8-P3, 9.9.8-S4, 9.9.9-S3 and 9.10.3-P3 are unpatched for a flaw in the 'totext_in_apl()' function in 'lib/dns/rdata/in_1/apl_42.c' that is triggered when handling certain string formatting operations. This may allow an authenticated, remote attacker to cause the named service to terminate.

Solution

Upgrade ISC BIND to version 9.10.3-P3 or later. If version 9.10.x cannot be obtained, versions 9.9.9-S3, 9.9.8-S4 and 9.9.8-P3 are also patched for this vulnerability.