[arch-security] [Arch Linux Security Advisory ASA-201412-7] bind: denial of service

Levente Polyak anthraxx at archlinux.org
Mon Dec 8 19:46:34 UTC 2014


Arch Linux Security Advisory ASA-201412-7
=========================================

Severity: High
Date    : 2014-12-08
CVE-ID  : CVE-2014-8500
Package : bind
Type    : denial of service
Remote  : Yes
Link    : https://wiki.archlinux.org/index.php/CVE-2014

Summary
=======

The package bind before version 9.10.1.P1-1 is vulnerable to denial of
service.

Resolution
==========

Upgrade to 9.10.1.P1-1.

# pacman -Syu "bind>=9.10.1.P1-1"

The problem has been fixed upstream in version 9.10.1.P1.

Workaround
==========

None.

Description
===========

By making use of maliciously-constructed zones or a rogue server, an
attacker can exploit an oversight in the code BIND 9 uses to follow
delegations in the Domain Name Service, causing BIND to issue unlimited
queries in an attempt to follow the delegation. This can lead to
resource exhaustion and denial of service (up to and including
termination of the named server process).

Impact
======

A remote attacker is able to make use of maliciously-constructed zones
or a rogue server that can lead to resource exhaustion and denial of
service.

References
==========

https://kb.isc.org/article/AA-01216/0
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8500

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: OpenPGP digital signature
URL: <https://lists.archlinux.org/pipermail/arch-security/attachments/20141208/f90c7554/attachment.bin>


More information about the arch-security mailing list