VuXML ID | Description |
0bc67930-d5c3-11e1-bef6-0024e81297ae | dns/bind9* -- Heavy DNSSEC Validation Load Can Cause a 'Bad Cache' Assertion Failure
ISC reports:
High numbers of queries with DNSSEC validation enabled can
cause an assertion failure in named, caused by using a 'bad cache'
data structure before it has been initialized.
BIND 9 stores a cache of query names that are known to be failing due
to misconfigured name servers or a broken chain of trust. Under high query
loads when DNSSEC validation is active, it is possible for a condition
to arise in which data from this cache of failing queries could be used
before it was fully initialized, triggering an assertion failure.
This bug cannot be encountered unless your server is doing DNSSEC
validation.
Discovery 2012-07-24 Entry 2012-07-24 bind99
< 9.9.1.2
bind98
< 9.8.3.2
bind97
< 9.7.6.2
bind96
< 9.6.3.1.ESV.R7.2
CVE-2012-3817
https://kb.isc.org/article/AA-00729
|
1e1421f0-8d6f-11e0-89b4-001ec9578670 | BIND -- Large RRSIG RRsets and Negative Caching DoS
ISC reports:
A BIND 9 DNS server set up to be a caching resolver is
vulnerable to a user querying a domain with very large resource
record sets (RRSets) when trying to negatively cache a response.
This can cause the BIND 9 DNS server (named process) to crash.
Discovery 2011-05-26 Entry 2011-06-04 Modified 2016-08-09 bind9-sdb-ldap
bind9-sdb-postgresql
< 9.4.3.4
bind96
< 9.6.3.1.ESV.R4.1
bind97
< 9.7.3.1
bind98
< 9.8.0.2
FreeBSD
ge 7.3 lt 7.3_6
ge 7.4 lt 7.4_2
ge 8.1 lt 8.1_4
ge 8.2 lt 8.2_2
CVE-2011-1910
SA-11:02.bind
http://www.isc.org/software/bind/advisories/cve-2011-1910
|
1ecc0d3f-ae8e-11e1-965b-0024e88a8c98 | dns/bind9* -- zero-length RDATA can cause named to terminate, reveal memory
ISC reports:
Processing of DNS resource records where the rdata field is zero length
may cause various issues for the servers handling them.
Processing of these records may lead to unexpected outcomes. Recursive
servers may crash or disclose some portion of memory to the client.
Secondary servers may crash on restart after transferring a zone
containing these records. Master servers may corrupt zone data if the
zone option "auto-dnssec" is set to "maintain". Other unexpected
problems that are not listed here may also be encountered.
Impact: This issue primarily affects recursive nameservers.
Authoritative nameservers will only be impacted if an administrator
configures experimental record types with no data. If the server is
configured this way, then secondaries can crash on restart after
transferring that zone. Zone data on the master can become corrupted if
the zone with those records has named configured to manage the DNSSEC
key rotation.
Discovery 2012-06-04 Entry 2012-06-04 Modified 2012-06-06 bind99
< 9.9.1.1
bind98
< 9.8.3.1
bind97
< 9.7.6.1
bind96
< 9.6.3.1.ESV.R7.1
CVE-2012-1667
http://www.isc.org/software/bind/advisories/cve-2012-1667
|
2892a8e2-3d68-11e2-8e01-0800273fe665 | dns/bind9* -- servers using DNS64 can be crashed by a crafted query
ISC reports:
BIND 9 nameservers using the DNS64 IPv6 transition mechanism are
vulnerable to a software defect that allows a crafted query to
crash the server with a REQUIRE assertion failure. Remote
exploitation of this defect can be achieved without extensive
effort, resulting in a denial-of-service (DoS) vector against
affected servers.
Discovery 2012-11-27 Entry 2012-12-04 bind99
< 9.9.2.1
bind99-base
< 9.9.2.1
bind98
< 9.8.4.1
bind98-base
< 9.8.4.1
CVE-2012-5688
|
4ccee784-a721-11e0-89b4-001ec9578670 | BIND -- Remote DoS with certain RPZ configurations
ISC reports:
Two defects were discovered in ISC's BIND 9.8 code. These
defects only affect BIND 9.8 servers which have recursion
enabled and which use a specific feature of the software known
as Response Policy Zones (RPZ) and where the RPZ zone contains
a specific rule/action pattern.
Discovery 2011-07-05 Entry 2011-07-05 bind98
< 9.8.0.4
CVE-2011-2465
https://www.isc.org/software/bind/advisories/cve-2011-2465
|
53a0ddef-0208-11e2-8afa-0024e830109b | dns/bind9* -- Several vulnerabilities
ISC reports:
Prevents a crash when queried for a record whose RDATA exceeds
65535 bytes.
Prevents a crash when validating caused by using "Bad cache" data
before it has been initialized.
ISC_QUEUE handling for recursive clients was updated to address
a race condition that could cause a memory leak. This rarely
occurred with UDP clients, but could be a significant problem
for a server handling a steady rate of TCP queries.
A condition has been corrected where improper handling of
zero-length RDATA could cause undesirable behavior, including
termination of the named process.
Discovery 2012-09-12 Entry 2012-09-18 bind99
< 9.9.1.3
bind98
< 9.8.3.3
bind97
< 9.7.6.3
bind96
< 9.6.3.1.ESV.R7.3
|
57a700f9-12c0-11e2-9f86-001d923933b6 | dns/bind9* -- crash on deliberately constructed combination of records
ISC reports:
A deliberately constructed combination of records could cause named
to hang while populating the additional section of a response.
Discovery 2012-09-26 Entry 2012-10-10 bind99
< 9.9.1.4
bind99-base
< 9.9.1.4
bind98
< 9.8.3.4
bind98-base
< 9.8.3.4
bind97
< 9.7.6.4
bind97-base
< 9.7.6.4
bind96
< 9.6.3.1.ESV.R7.4
bind96-base
< 9.6.3.1.ESV.R7.4
CVE-2012-5166
|
72f35727-ce83-11e2-be04-005056a37f68 | dns/bind9* -- A recursive resolver can be crashed by a query for a malformed zone
ISC reports:
A bug has been discovered in the most recent releases of
BIND 9 which has the potential for deliberate exploitation
as a denial-of-service attack. By sending a recursive
resolver a query for a record in a specially malformed zone,
an attacker can cause BIND 9 to exit with a fatal
"RUNTIME_CHECK" error in resolver.c.
Discovery 2013-06-04 Entry 2013-06-06 Modified 2013-06-07 bind99
gt 9.9.3 lt 9.9.3.1
bind99-base
gt 9.9.3 lt 9.9.3.1
bind98
gt 9.8.5 lt 9.8.5.1
bind98-base
gt 9.8.5 lt 9.8.5.1
bind96
gt 9.6.3.1.ESV.R9 lt 9.6.3.2.ESV.R9
bind96-base
gt 9.6.3.1.ESV.R9 lt 9.6.3.2.ESV.R9
CVE-2013-3919
|
7943e521-f648-11e2-8607-3c970e169bc2 | bind -- denial of service vulnerability
ISC reports:
A specially crafted query that includes malformed
rdata can cause named to terminate with an assertion
failure while rejecting the malformed query.
Discovery 2013-07-26 Entry 2013-07-26 Modified 2016-08-09 bind99
gt 9.9.3 lt 9.9.3.2
bind99-base
gt 9.9.3 lt 9.9.3.2
bind98
gt 9.8.5 lt 9.8.5.2
bind98-base
gt 9.8.5 lt 9.8.5.2
FreeBSD
ge 9.0 lt 9.1_5
ge 8.4 lt 8.4_2
CVE-2013-4854
SA-13:07.bind
https://kb.isc.org/article/AA-01015/0
|
7a282e49-95b6-11e2-8433-0800273fe665 | dns/bind9* -- Malicious Regex Can Cause Memory Exhaustion
ISC reports:
A critical defect in BIND 9 allows an attacker to cause
excessive memory consumption in named or other programs
linked to libdns.
Discovery 2013-03-11 Entry 2013-03-27 bind99
< 9.9.2.2
bind99-base
< 9.9.2.2
bind98
< 9.8.4.2
bind98-base
< 9.8.4.2
CVE-2013-2266
|
90cc1494-10ac-11e1-b3ec-0024e830109b | BIND -- Remote DOS
The Internet Systems Consortium reports:
Organizations across the Internet reported crashes interrupting
service on BIND 9 nameservers performing recursive queries.
Affected servers crashed after logging an error in query.c with
the following message: "INSIST(! dns_rdataset_isassociated(sigrdataset))"
Multiple versions were reported being affected, including all
currently supported release versions of ISC BIND 9.
Because it may be possible to trigger this bug even on networks
that do not allow untrusted users to access the recursive name
servers (perhaps via specially crafted e-mail messages, and/or
malicious web sites) it is recommended that ALL operators of
recursive name servers upgrade immediately.
Discovery 2011-11-16 Entry 2011-11-16 Modified 2012-01-29 FreeBSD
ge 7.3 lt 7.3_9
ge 7.4 lt 7.4_5
ge 8.1 lt 8.1_7
ge 8.2 lt 8.2_5
bind96
< 9.6.3.1.ESV.R5.1
bind97
< 9.7.4.1
bind98
< 9.8.1.1
SA-11:06.bind
CVE-2011-4313
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4313
https://www.isc.org/software/bind/advisories/cve-2011-4313
|
ab3e98d9-8175-11e4-907d-d050992ecde8 | bind -- denial of service vulnerability
ISC reports:
We have today posted updated versions of 9.9.6 and 9.10.1
to address a significant security vulnerability in DNS
resolution. The flaw was discovered by Florian Maury of
ANSSI, and applies to any recursive resolver that does not
support a limit on the number of recursions. [CERTFR-2014-AVI-512],
[USCERT VU#264212]
A flaw in delegation handling could be exploited to put named
into an infinite loop, in which each lookup of a name server
triggered additional lookups of more name servers. This has
been addressed by placing limits on the number of levels of
recursion named will allow (default 7), and on the number of
queries that it will send before terminating a recursive query
(default 50). The recursion depth limit is configured via the
max-recursion-depth option, and the query limit via the
max-recursion-queries option. For more information, see the
security advisory at https://kb.isc.org/article/AA-01216/.
[CVE-2014-8500]
[RT #37580]
In addition, we have also corrected a potential security
vulnerability in the GeoIP feature in the 9.10.1 release only.
For more information on this issue, see the security advisory
at https://kb.isc.org/article/AA-01217.
[CVE-2014-8680]
Discovery 2014-12-08 Entry 2014-12-11 Modified 2016-08-09 bind99
bind99-base
< 9.9.6
bind98
bind98-base
bind96
bind96-base
gt 0
FreeBSD
ge 9.3 lt 9.3_6
ge 9.2 lt 9.2_16
ge 9.1 lt 9.1_23
ge 8.4 lt 8.4_20
SA-14:29.bind
CVE-2014-8500
CVE-2014-8680
https://www.isc.org/blogs/important-security-advisory-posted/
|
c9075321-f483-11e5-92ce-002590263bf5 | bind -- denial of service vulnerability
ISC reports:
An error parsing input received by the rndc control channel can
cause an assertion failure in sexpr.c or alist.c.
Discovery 2016-03-09 Entry 2016-03-28 Modified 2016-08-09 bind98
le 9.8.8
bind99
ge 9.9.0 lt 9.9.8P4
bind910
ge 9.10.0 lt 9.10.3P4
bind9-devel
< 9.11.0.a20160309
FreeBSD
ge 9.3 lt 9.3_38
CVE-2016-1285
SA-16:13.bind
https://kb.isc.org/article/AA-01352
|
cb252f01-7c43-11e3-b0a6-005056a37f68 | bind -- denial of service vulnerability
ISC reports:
Because of a defect in handling queries for NSEC3-signed zones,
BIND can crash with an "INSIST" failure in name.c when processing
queries possessing certain properties. By exploiting this defect
an attacker deliberately constructing a query with the right
properties could achieve denial of service against an authoritative
nameserver serving NSEC3-signed zones.
Discovery 2014-01-08 Entry 2014-01-13 Modified 2016-08-09 bind99
< 9.9.4.2
bind99-base
< 9.9.4.2
bind98
< 9.8.6.2
bind98-base
< 9.8.6.2
bind96
< 9.6.3.2.ESV.R10.2
bind96-base
< 9.6.3.2.ESV.R10.2
FreeBSD
ge 9.2 lt 9.2_3
ge 9.1 lt 9.1_10
ge 8.4 lt 8.4_7
ge 8.3 lt 8.3_14
CVE-2014-0591
SA-14:04.bind
https://kb.isc.org/article/AA-01078/74/
|
cba246d2-f483-11e5-92ce-002590263bf5 | bind -- denial of service vulnerability
ISC reports:
A problem parsing resource record signatures for DNAME resource
records can lead to an assertion failure in resolver.c or db.c
Discovery 2016-03-09 Entry 2016-03-28 Modified 2016-08-09 bind98
le 9.8.8
bind99
ge 9.9.0 lt 9.9.8P4
bind910
ge 9.10.0 lt 9.10.3P4
bind9-devel
< 9.11.0.a20160309
FreeBSD
ge 9.3 lt 9.3_38
CVE-2016-1286
SA-16:13.bind
https://kb.isc.org/article/AA-01353
|
fd64188d-a71d-11e0-89b4-001ec9578670 | BIND -- Remote DoS against authoritative and recursive servers
ISC reports:
A defect in the affected BIND 9 versions allows an attacker to
remotely cause the "named" process to exit using a specially
crafted packet.
This defect affects both recursive and authoritative servers.
Discovery 2011-07-05 Entry 2011-07-05 bind96
< 9.6.3.1.ESV.R4.3
bind97
< 9.7.3.3
bind98
< 9.8.0.4
CVE-2011-2464
https://www.isc.org/software/bind/advisories/cve-2011-2464
|