ISC BIND 9.7.x < 9.9.7-P2 / 9.10.x < 9.10.2-P3 TKEY Query Handling Remote DoS

high Nessus Plugin ID 85241
New! Vulnerability Priority Rating (VPR)

Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it is different from CVSS.

VPR Score: 6

Synopsis

The remote name server is affected by a denial of service vulnerability.

Description

According to its self-reported version number, the installation of ISC BIND on the remote name server is potentially affected by a denial of service vulnerability due to a REQUIRE assertion flaw that occurs while handling TKEY queries. A remote attacker can exploit this by using a specially crafted TKEY query to crash the daemon.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Upgrade to BIND version 9.9.7-P2 / 9.10.2-P3 or later, or apply the patch referenced in the advisory.

See Also

https://kb.isc.org/article/AA-01272

https://kb.isc.org/article/AA-01279

https://kb.isc.org/article/AA-01280

Plugin Details

Severity: High

ID: 85241

File Name: bind9_9102_p3.nasl

Version: 1.8

Type: remote

Family: DNS

Published: 8/5/2015

Updated: 6/27/2018

Dependencies: bind_version.nasl

Configuration: Enable paranoid mode

Risk Information

Risk Factor: High

VPR Score: 6

CVSS v2.0

Base Score: 7.8

Temporal Score: 6.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

Vulnerability Information

CPE: cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*

Required KB Items: Settings/ParanoidReport, bind/version

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 7/28/2015

Vulnerability Publication Date: 7/28/2015

Exploitable With

Core Impact

Reference Information

CVE: CVE-2015-5477

EDB-ID: 37721