First published: Sat Jan 11 2014(Updated: )
It was reported that a defect in how BIND handled queries for NSEC3-signed zones could cause a crash of the named daemon with an "INSIST" failure when processing queries that possessed certain properties. A remote attacker could exploit this defect by constructing a carefully-crafted query against an authoritative nameserver that served NSEC3-signed zones. Note that this flaw affects BIND versions 9.6.0 and higher (NSEC3 was introduced in BIND 9.6.0 but is not automatically enabled). Authoritative nameservers that are serving at least one NSEC3-signed zone are vulnerable. Authoritative nameservers that are NOT serving at least one NSEC3-signed zone are not vulnerable, nor are recursive-only servers. Servers running versions of BIND older than 9.6.0 are also not vulnerable. There are no workarounds for this issue.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ISC BIND | =9.6 | |
ISC BIND | =9.6-r5_p1 | |
ISC BIND | =9.6-r6_b1 | |
ISC BIND | =9.6-r6_rc1 | |
ISC BIND | =9.6-r6_rc2 | |
ISC BIND | =9.6-r7_p1 | |
ISC BIND | =9.6-r7_p2 | |
ISC BIND | =9.6-r9_p1 | |
ISC BIND | =9.6.0 | |
ISC BIND | =9.6.0-p1 | |
ISC BIND | =9.6.0-rc1 | |
ISC BIND | =9.6.0-rc2 | |
ISC BIND | =9.6.1 | |
ISC BIND | =9.6.1-p1 | |
ISC BIND | =9.6.1-p2 | |
ISC BIND | =9.6.1-p3 | |
ISC BIND | =9.6.1-rc1 | |
ISC BIND | =9.6.2 | |
ISC BIND | =9.6.2-rc1 | |
ISC BIND | =9.6.3 | |
ISC BIND | =9.6.3-rc1 | |
ISC BIND | =9.7.0 | |
ISC BIND | =9.7.0-b1 | |
ISC BIND | =9.7.0-p1 | |
ISC BIND | =9.7.0-p2 | |
ISC BIND | =9.7.0-rc1 | |
ISC BIND | =9.7.0-rc2 | |
ISC BIND | =9.7.1 | |
ISC BIND | =9.7.1-p1 | |
ISC BIND | =9.7.1-p2 | |
ISC BIND | =9.7.1-rc1 | |
ISC BIND | =9.7.2 | |
ISC BIND | =9.7.2-p1 | |
ISC BIND | =9.7.2-p2 | |
ISC BIND | =9.7.2-p3 | |
ISC BIND | =9.7.2-rc1 | |
ISC BIND | =9.7.3 | |
ISC BIND | =9.7.3-b1 | |
ISC BIND | =9.7.3-p1 | |
ISC BIND | =9.7.3-rc1 | |
ISC BIND | =9.7.4 | |
ISC BIND | =9.7.4-b1 | |
ISC BIND | =9.7.4-p1 | |
ISC BIND | =9.7.4-rc1 | |
ISC BIND | =9.7.5 | |
ISC BIND | =9.7.5-b1 | |
ISC BIND | =9.7.5-rc1 | |
ISC BIND | =9.7.5-rc2 | |
ISC BIND | =9.7.6 | |
ISC BIND | =9.7.6-p1 | |
ISC BIND | =9.7.6-p2 | |
ISC BIND | =9.7.7 | |
ISC BIND | =9.8.0 | |
ISC BIND | =9.8.0-a1 | |
ISC BIND | =9.8.0-b1 | |
ISC BIND | =9.8.0-p1 | |
ISC BIND | =9.8.0-p2 | |
ISC BIND | =9.8.0-p4 | |
ISC BIND | =9.8.0-rc1 | |
ISC BIND | =9.8.1 | |
ISC BIND | =9.8.1-b1 | |
ISC BIND | =9.8.1-b2 | |
ISC BIND | =9.8.1-b3 | |
ISC BIND | =9.8.1-p1 | |
ISC BIND | =9.8.1-rc1 | |
ISC BIND | =9.8.2-b1 | |
ISC BIND | =9.8.2-rc1 | |
ISC BIND | =9.8.2-rc2 | |
ISC BIND | =9.8.3 | |
ISC BIND | =9.8.3-p1 | |
ISC BIND | =9.8.3-p2 | |
ISC BIND | =9.8.4 | |
ISC BIND | =9.8.5 | |
ISC BIND | =9.8.5-b1 | |
ISC BIND | =9.8.5-b2 | |
ISC BIND | =9.8.5-p1 | |
ISC BIND | =9.8.5-p2 | |
ISC BIND | =9.8.5-rc1 | |
ISC BIND | =9.8.5-rc2 | |
ISC BIND | =9.8.6 | |
ISC BIND | =9.8.6-b1 | |
ISC BIND | =9.8.6-p1 | |
ISC BIND | =9.8.6-rc1 | |
ISC BIND | =9.8.6-rc2 | |
ISC BIND | =9.9.4 | |
ISC BIND | =9.9.4-p1 | |
ISC BIND | =9.9.4-rc1 | |
ISC BIND | =9.9.4-rc2 | |
redhat/bind | <9.6 | 9.6 |
redhat/bind | <9.8.6 | 9.8.6 |
redhat/bind | <9.9.4 | 9.9.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.