[arch-security] [Arch Linux Security Advisory ASA-201412-7] bind: denial of service
Arch Linux Security Advisory ASA-201412-7 ========================================= Severity: High Date : 2014-12-08 CVE-ID : CVE-2014-8500 Package : bind Type : denial of service Remote : Yes Link : https://wiki.archlinux.org/index.php/CVE-2014 Summary ======= The package bind before version 9.10.1.P1-1 is vulnerable to denial of service. Resolution ========== Upgrade to 9.10.1.P1-1. # pacman -Syu "bind>=9.10.1.P1-1" The problem has been fixed upstream in version 9.10.1.P1. Workaround ========== None. Description =========== By making use of maliciously-constructed zones or a rogue server, an attacker can exploit an oversight in the code BIND 9 uses to follow delegations in the Domain Name Service, causing BIND to issue unlimited queries in an attempt to follow the delegation. This can lead to resource exhaustion and denial of service (up to and including termination of the named server process). Impact ====== A remote attacker is able to make use of maliciously-constructed zones or a rogue server that can lead to resource exhaustion and denial of service. References ========== https://kb.isc.org/article/AA-01216/0 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8500
participants (1)
-
Levente Polyak