Описание
named in ISC BIND 9.x before 9.9.8-P4 and 9.10.x before 9.10.3-P4 does not properly handle DNAME records when parsing fetch reply messages, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a malformed packet to the rndc (aka control channel) interface, related to alist.c and sexpr.c.
A denial of service flaw was found in the way BIND processed certain control channel input. A remote attacker able to send a malformed packet to the control channel could use this flaw to cause named to crash.
Меры по смягчению последствий
Restrict access to the control channel (by using the "controls" configuration statement in named.conf) to allow connection only from trusted systems. Note that if no "controls" statement is present, named defaults to allowing control channel connections only from localhost (127.0.0.1 and ::1) if and only if the file rndc.key exists in the configuration directory and contains valid key syntax. If rndc.key is not present and no "controls" statement is present in named.conf, named will not accept commands on the control channel.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 4 | bind | Will not fix | ||
Red Hat Enterprise Linux 5 | bind97 | Fixed | RHSA-2016:0458 | 16.03.2016 |
Red Hat Enterprise Linux 5 | bind | Fixed | RHSA-2016:0459 | 16.03.2016 |
Red Hat Enterprise Linux 6 | bind | Fixed | RHSA-2016:0459 | 16.03.2016 |
Red Hat Enterprise Linux 6.2 Advanced Update Support | bind | Fixed | RHSA-2016:0601 | 06.04.2016 |
Red Hat Enterprise Linux 6.4 Advanced Update Support | bind | Fixed | RHSA-2016:0562 | 31.03.2016 |
Red Hat Enterprise Linux 6.5 Advanced Update Support | bind | Fixed | RHSA-2016:0562 | 31.03.2016 |
Red Hat Enterprise Linux 6.6 Extended Update Support | bind | Fixed | RHSA-2016:0562 | 31.03.2016 |
Red Hat Enterprise Linux 7 | bind | Fixed | RHSA-2016:0459 | 16.03.2016 |
Показывать по
Дополнительная информация
Статус:
EPSS
5 Medium
CVSS2
Связанные уязвимости
named in ISC BIND 9.x before 9.9.8-P4 and 9.10.x before 9.10.3-P4 does not properly handle DNAME records when parsing fetch reply messages, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a malformed packet to the rndc (aka control channel) interface, related to alist.c and sexpr.c.
named in ISC BIND 9.x before 9.9.8-P4 and 9.10.x before 9.10.3-P4 does not properly handle DNAME records when parsing fetch reply messages, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a malformed packet to the rndc (aka control channel) interface, related to alist.c and sexpr.c.
named in ISC BIND 9.x before 9.9.8-P4 and 9.10.x before 9.10.3-P4 does ...
named in ISC BIND 9.x before 9.9.8-P4 and 9.10.x before 9.10.3-P4 does not properly handle DNAME records when parsing fetch reply messages, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a malformed packet to the rndc (aka control channel) interface, related to alist.c and sexpr.c.
Уязвимость сервера DNS BIND, позволяющая нарушителю вызвать отказ в обслуживании
EPSS
5 Medium
CVSS2