Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2016-1285

Опубликовано: 09 мар. 2016
Источник: redhat
CVSS2: 5
EPSS Средний

Описание

named in ISC BIND 9.x before 9.9.8-P4 and 9.10.x before 9.10.3-P4 does not properly handle DNAME records when parsing fetch reply messages, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a malformed packet to the rndc (aka control channel) interface, related to alist.c and sexpr.c.

A denial of service flaw was found in the way BIND processed certain control channel input. A remote attacker able to send a malformed packet to the control channel could use this flaw to cause named to crash.

Меры по смягчению последствий

Restrict access to the control channel (by using the "controls" configuration statement in named.conf) to allow connection only from trusted systems. Note that if no "controls" statement is present, named defaults to allowing control channel connections only from localhost (127.0.0.1 and ::1) if and only if the file rndc.key exists in the configuration directory and contains valid key syntax. If rndc.key is not present and no "controls" statement is present in named.conf, named will not accept commands on the control channel.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 4bindWill not fix
Red Hat Enterprise Linux 5bind97FixedRHSA-2016:045816.03.2016
Red Hat Enterprise Linux 5bindFixedRHSA-2016:045916.03.2016
Red Hat Enterprise Linux 6bindFixedRHSA-2016:045916.03.2016
Red Hat Enterprise Linux 6.2 Advanced Update SupportbindFixedRHSA-2016:060106.04.2016
Red Hat Enterprise Linux 6.4 Advanced Update SupportbindFixedRHSA-2016:056231.03.2016
Red Hat Enterprise Linux 6.5 Advanced Update SupportbindFixedRHSA-2016:056231.03.2016
Red Hat Enterprise Linux 6.6 Extended Update SupportbindFixedRHSA-2016:056231.03.2016
Red Hat Enterprise Linux 7bindFixedRHSA-2016:045916.03.2016

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-617
https://bugzilla.redhat.com/show_bug.cgi?id=1315674bind: malformed packet sent to rndc can trigger assertion failure

EPSS

Процентиль: 98%
0.64255
Средний

5 Medium

CVSS2

Связанные уязвимости

CVSS3: 6.8
ubuntu
больше 9 лет назад

named in ISC BIND 9.x before 9.9.8-P4 and 9.10.x before 9.10.3-P4 does not properly handle DNAME records when parsing fetch reply messages, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a malformed packet to the rndc (aka control channel) interface, related to alist.c and sexpr.c.

CVSS3: 6.8
nvd
больше 9 лет назад

named in ISC BIND 9.x before 9.9.8-P4 and 9.10.x before 9.10.3-P4 does not properly handle DNAME records when parsing fetch reply messages, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a malformed packet to the rndc (aka control channel) interface, related to alist.c and sexpr.c.

CVSS3: 6.8
debian
больше 9 лет назад

named in ISC BIND 9.x before 9.9.8-P4 and 9.10.x before 9.10.3-P4 does ...

CVSS3: 6.8
github
больше 3 лет назад

named in ISC BIND 9.x before 9.9.8-P4 and 9.10.x before 9.10.3-P4 does not properly handle DNAME records when parsing fetch reply messages, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a malformed packet to the rndc (aka control channel) interface, related to alist.c and sexpr.c.

fstec
больше 9 лет назад

Уязвимость сервера DNS BIND, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 98%
0.64255
Средний

5 Medium

CVSS2