First published: Mon May 02 2005(Updated: )
An "incorrect assumption" in the authvalidated validator function in BIND 9.3.0, when DNSSEC is enabled, allows remote attackers to cause a denial of service (named server exit) via crafted DNS packets that cause an internal consistency test (self-check) to fail.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
BIND 9 | =9.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-0034 is rated as a high severity vulnerability due to its potential to cause a denial of service.
To fix CVE-2005-0034, it is recommended to upgrade BIND to a version later than 9.3.0 that addresses this vulnerability.
CVE-2005-0034 specifically affects BIND version 9.3.0 when DNSSEC is enabled.
CVE-2005-0034 enables remote attackers to execute a denial of service attack by sending crafted DNS packets.
While upgrading is the best solution, a temporary workaround includes disabling DNSSEC if it is not crucial for your environment.