SynopsisThe remote name server is affected by multiple denial of service vulnerabilities.
DescriptionAccording to its self-reported version number, the installation of ISC BIND running on the remote name server is affected by multiple denial of service vulnerabilities :
- A denial of service vulnerability exists due to improper handling of certain string formatting options. An authenticated, remote attacker can exploit this, via a malformed Address Prefix List (APL) record, to cause an INSIST assertion failure and daemon exit.
- A denial of service vulnerability exists due to a failure to properly convert OPT records and ECS options to formatted text. A remote attacker can exploit this to cause a REQUIRE assertion failure and daemon exit.
Note that this issue only affects BIND 9.10.x.
Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.
SolutionUpgrade to BIND version 9.9.8-P3 / 9.9.8-S4 / 9.10.3-P3 or later.