First published: Thu Jul 07 2016(Updated: )
It was found that bind does not implement reasonable restrictions for zone sizes. This allows an explicitly configured primary DNS server for a zone to crash a secondary DNS server, affecting service of other zones hosted on the same secondary server. CVE request: <a href="http://seclists.org/oss-sec/2016/q3/19">http://seclists.org/oss-sec/2016/q3/19</a> Proposed patches: <a href="https://github.com/sischkg/xfer-limit/blob/master/bind-9.10.3-xfer-limit-0.0.1.patch">https://github.com/sischkg/xfer-limit/blob/master/bind-9.10.3-xfer-limit-0.0.1.patch</a> <a href="https://github.com/sischkg/xfer-limit/blob/master/bind-9.9.9-P1-xfer-limit-0.0.1.patch">https://github.com/sischkg/xfer-limit/blob/master/bind-9.9.9-P1-xfer-limit-0.0.1.patch</a>
Affected Software | Affected Version | How to fix |
---|---|---|
BIND 9 | >=9.9.9-P1<=9.10.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1353563 is critical due to its ability to crash secondary DNS servers and disrupt services.
To fix REDHAT-BUG-1353563, update your BIND installation to a version later than 9.10.3 or apply the recommended patches.
BIND versions from 9.9.9-P1 to 9.10.3 are affected by REDHAT-BUG-1353563.
The REDHAT-BUG-1353563 vulnerability primarily impacts systems running ISC BIND DNS servers.
The potential impact of REDHAT-BUG-1353563 includes service outages for zones hosted on a compromised secondary DNS server.