First published: Wed Feb 20 2019(Updated: )
ISC BIND could allow a remote attacker to obtain sensitive information, caused by the failure to properly apply controls for zone transfers to Dynamically Loadable Zones (DLZs) if the zones are writable. An attacker could exploit this vulnerability to request and receive a zone transfer of a DLZ even when not permitted to do so by the allow-transfer ACL.
Credit: security-officer@isc.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/bind | <9.11.5 | 9.11.5 |
redhat/bind | <9.12.3 | 9.12.3 |
IBM Data Risk Manager | <=2.0.6 | |
ISC BIND 9 | >=9.9.0<=9.10.7 | |
ISC BIND 9 | >=9.11.0<=9.11.4 | |
ISC BIND 9 | >=9.12.0<=9.12.2 | |
ISC BIND 9 | >=9.13.0<=9.13.6 | |
ISC BIND 9 | =9.9.3-s1 | |
ISC BIND 9 | =9.10.8 | |
ISC BIND 9 | =9.10.8-p1 | |
ISC BIND 9 | =9.11.5 | |
ISC BIND 9 | =9.11.5-p1 | |
ISC BIND 9 | =9.11.5-p2 | |
ISC BIND 9 | =9.11.5-s3 | |
ISC BIND 9 | =9.12.3 | |
ISC BIND 9 | =9.12.3-p1 | |
ISC BIND 9 | =9.12.3-p2 | |
Red Hat Enterprise Linux | =8.0 |
Upgrade to the patched release most closely related to your current version of BIND: >= BIND 9.11.5-P4 >= BIND 9.12.3-P4 BIND Supported Preview Edition is a special feature preview branch of BIND provided to eligible ISC support customers. >= BIND 9.11.5-S5
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-6465 is considered a moderate severity vulnerability that can lead to sensitive information exposure.
To remediate CVE-2019-6465, you should upgrade to BIND version 9.11.5 or 9.12.3 or apply appropriate patches.
CVE-2019-6465 affects various versions of ISC BIND and IBM Data Risk Manager that do not have the latest security updates.
Yes, CVE-2019-6465 can be exploited by remote attackers to perform unauthorized zone transfers.
BIND versions prior to 9.11.5 and 9.12.3, as well as several other versions in between, are vulnerable to CVE-2019-6465.