Advertisement






BIND 9.10.1 A Defect in Delegation Handling Vulnerability

CVE Category Price Severity
CVE-2014-8500 CWE-467: Use of sizeof() on a Pointer Type $10,000 High
Author Risk Exploitation Type Date
Unknown High Remote 2014-12-09
CPE
cpe:cpe:/a:bind:bind:9.10.1
CVSS EPSS EPSSP
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 0.02192 0.50148

CVSS vector description

Our sensors found this exploit at: http://cxsecurity.com/ascii/WLB-2014120050

Below is a copy:

CVE: CVE-2014-8500 
Document Version:         2.0
Posting date: 08 December 2014
Program Impacted: BIND 9
Versions affected: 9.0.x -> 9.8.x, 9.9.0 -> 9.9.6, 9.10.0 -> 9.10.1
Severity: Critical
Exploitable: Remotely
Description:

By making use of maliciously-constructed zones or a rogue server, an attacker can exploit an oversight in the code BIND 9 uses to follow delegations in the Domain Name Service, causing BIND to issue unlimited queries in an attempt to follow the delegation.  This can lead to resource exhaustion and denial of service (up to and including termination of the named server process.)

Impact:

All recursive resolvers are affected.  Authoritative servers can be affected if an attacker can control a delegation traversed by the authoritative server in servicing the zone.

CVSS Score:  7.8

CVSS Vector:  (AV:N/AC:L/Au:N/C:N/I:N/A:C)

For more information on the Common Vulnerability Scoring System and to obtain your specific environmental score please visit: http://nvd.nist.gov/cvss.cfm?calculator&version=2&vector=(AV:N/AC:L/Au:N/C:N/I:N/A:C)

Workarounds:

No workarounds exist.  Vulnerable versions of BIND 9 should be upgraded.

Active exploits: 

No known active exploits.

Solution:  Upgrade to the patched release most closely related to your current version of BIND.  Patched builds of currently supported branches of BIND (9.9 and 9.10) can be downloaded via http://www.isc.org/downloads

BIND 9 version 9.9.6-P1
BIND 9 version 9.10.1-P1

Regarding older versions:
BIND 9.6-ESV and BIND 9.8 have been officially designated "end of life" (EOL) and no longer receive support.  All organizations running EOL branches should be planning transition to currently supported branches.  However, due to the severity of this particular issue, source code diffs which can be applied to BIND 9.8 and BIND 9.6-ESV will be made available on request to [email protected].

Acknowledgements: 
ISC would like to thank Florian Maury (ANSSI) for discovering and reporting this vulnerability.




Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum