Advertisement






ISC BIND 9.10.0 P1 remote denial of service

CVE Category Price Severity
CVE-2014-3859 CWE-362 $5,000 High
Author Risk Exploitation Type Date
unknown Critical Remote 2014-06-15
CPE
cpe:cpe:/a:isc:bind:9.10.0:p1
CVSS EPSS EPSSP
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H 0.02192 0.50148

CVSS vector description

Our sensors found this exploit at: http://cxsecurity.com/ascii/WLB-2014060084

Below is a copy:

libdns in ISC BIND 9.10.0 before P2 does not properly handle EDNS options, which allows remote attackers to cause a denial of service (REQUIRE assertion failure and daemon exit) via a crafted packet, as demonstrated by an attack against named, dig, or delv.

BIND 9.10.0-P2 is a security fix release of BIND 9.10 which also includes changes to address GCC optimization issues described in ISC Operational Notification https://kb.isc.org/article/AA-01167.

This document summarizes features added or significantly changed since the previous major release, BIND 9.9. Bug fixes since BIND 9.10.0 are also summarized. Changes marked with '**' have been added since the previous release (BIND 9.10.0-P1). Please see the CHANGES file in the source code release for a complete list of all changes.

Security

- A query specially crafted to exploit a defect in EDNS option processing can cause named to terminate with an assertion failure. This fixes a missing isc_buffer_availablelength check when printing out a packet.  [CVE-2014-3859] [RT #36078] **
- A programming error in the prefetch feature could cause named to crash with a "REQUIRE" assertion failure in name.c [CVE-2014-3214] [RT #35899]

Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum