JPCERT-AT-2014-0050
JPCERT/CC
2014-12-09
<<< JPCERT/CC Alert 2014-12-09 >>>
Denial-of-Service vulnerability (CVE-2014-8500) in ISC BIND 9
https://www.jpcert.or.jp/english/at/2014/at140050.html
I. Overview
ISC BIND 9 contains a vulnerability that leads to a
denial-of-service (DoS). A remote attacker leveraging this
vulnerability may result in the abnormal termination of 'named'.
If operating an affected version of ISC BIND 9 (authoritative DNS
server, cache DNS server), update to a version that addresses this
vulnerability after referring to the information in "III. Solution"
According to ISC, this vulnerability has not been confirmed to be
leveraged for use in attacks.
Internet Systems Consortium, Inc. (ISC)
CVE-2014-8500: A Defect in Delegation Handling Can Be Exploited to Crash BIND
https://kb.isc.org/article/AA-01216
II. Affected Systems
According to ISC, the following versions are affected by this
vulnerability:
ISC BIND 9
ISC Severity Rating: Critical
For a listing of vulnerabilities that affect each version of ISC
BIND 9, refer to the following:
BIND 9 Security Vulnerability Matrix
https://kb.isc.org/article/AA-00913/
Depending on configuration of ISC BIND, authoritative DNS servers
may be affected by this vulnerability. Also, this vulnerability is
caused by both an issue in the DNS specifications and implementation.
As a result, DNS servers other than BIND may be affected.
If you are using BIND provided by a distributor, refer to the
information provided by that distributor.
III. Solution
ISC has released versions of ISC BIND 9 that address this
vulnerability. Distributors are likely to provide their own
versions that address this vulnerability. Consider updating to an
updated version after thorough testing.
Versions that address this vulnerability are as follows:
ISC BIND 9
- version 9.9.6-P1
- version 9.10.1-P1
IV. References
Japan Registry Services (JPRS)
(Critical) Vulnerability (excessive use of system resources) in multiple DNS software (Released 12/9/2014)
http://jprs.jp/tech/security/2014-12-09-multiple-impl-vuln-delegation-limit.html
If you have any information regarding this alert, please contact
JPCERT/CC.
======================================================================
JPCERT Coordination Center (JPCERT/CC)
MAIL: info@jpcert.or.jp
TEL: +81-3-3518-4600 FAX: +81-3-3518-4602
https://www.jpcert.or.jp/english/
Top