JPCERT-AT-2015-0027 JPCERT/CC 2015-07-29 <<< JPCERT/CC Alert 2015-07-29 >>> Alert on denial-of-service vulnerability (CVE-2015-5477) in ISC BIND 9 https://www.jpcert.or.jp/english/at/2015/at150027.html I. Overview ISC BIND 9 contains a vulnerability that leads to a denial-of-service (DoS). When this vulnerability is leveraged, a remote attacker may cause an abnormal termination of named. If operating an affected version of ISC BIND 9 (authoritative DNS server, cache DNS server), please consider updating to a version that addresses this vulnerability after referring to the information in "III. Solution". According to ISC, users are recommended to update the software to the latest version as soon as possible. Internet Systems Consortium, Inc. (ISC) CVE-2015-5477: An error in handling TKEY queries can cause named to exit with a REQUIRE assertion failure https://kb.isc.org/article/AA-01272 II. Affected Systems According to the information provided by ISC, the following versions are affected by this vulnerability. ISC has rated this vulnerability as "Critical" ISC BIND - Versions prior to 9.9.7-P1 for 9.9.x versions - Versions prior to 9.10.2-P2 for 9.10.x versions Unsupported versions of ISC BIND 9.1.x through 9.8.x are also affected by this vulnerability. For more details, refer to the following: BIND 9 Security Vulnerability Matrix https://kb.isc.org/article/AA-00913/ If you are using BIND provided by a distributor, refer to the information provided by that distributor. III. Solution ISC has released versions of ISC BIND that address this vulnerability. Distributors are likely to provide their own versions that address this vulnerability. Consider updating to an updated version after thorough testing. Versions that address this vulnerability are as follows: ISC BIND - BIND 9 version 9.9.7-P2 - BIND 9 version 9.10.2-P3 IV. References US-CERT Internet Systems Consortium (ISC) Releases Security Updates for BIND https://www.us-cert.gov/ncas/current-activity/2015/07/28/Internet-Systems-Consortium-ISC-Releases-Security-Updates-BIND Japan Registry Services (JPRS) (Critical) Vulnerability in BIND 9.x (DNS Service suspension) (Released 7/29/2015)(Japanese) http://jprs.jp/tech/security/2015-07-29-bind9-vuln-tkey.html If you have any information regarding this alert, please contact JPCERT/CC. ====================================================================== JPCERT Coordination Center (JPCERT/CC) MAIL: info@jpcert.or.jp TEL: +81-3-3518-4600 FAX: +81-3-3518-4602 https://www.jpcert.or.jp/english/