First published: Wed Oct 09 2019(Updated: )
In BIND Supported Preview Edition, an error in the nxdomain-redirect feature can occur in versions which support EDNS Client Subnet (ECS) features. In those versions which have ECS support, enabling nxdomain-redirect is likely to lead to BIND exiting due to assertion failure. Versions affected: BIND Supported Preview Edition version 9.10.5-S1 -> 9.11.5-S5. ONLY BIND Supported Preview Edition releases are affected.
Credit: security-officer@isc.org
Affected Software | Affected Version | How to fix |
---|---|---|
ISC BIND | =9.10.5-s1 | |
ISC BIND | =9.11.5-s5 |
Upgrade to the patched release most closely related to your current version of BIND: BIND Supported Preview Edition is a special feature preview branch of BIND provided to eligible ISC support customers. + BIND 9.11.5-S6 + BIND 9.11.6-S1
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this BIND vulnerability is CVE-2019-6468.
The severity of CVE-2019-6468 is high with a CVSS score of 7.5.
BIND version 9.10.5-s1 and 9.11.5-s5 in the Supported Preview Edition are affected by CVE-2019-6468.
Enabling the nxdomain-redirect feature with ECS support in the affected versions of BIND can lead to BIND exiting due to assertion failure.
Updating to a version of BIND that does not have the vulnerability is the recommended fix for CVE-2019-6468.