Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

High Severity DoS Flaw Patched in BIND

Updates released this week by the Internet Systems Consortium (ISC) for the DNS software BIND address two vulnerabilities, including a new high-severity issue that can be exploited remotely.

Updates released this week by the Internet Systems Consortium (ISC) for the DNS software BIND address two vulnerabilities, including a new high-severity issue that can be exploited remotely.

BIND 9.9.9-P3, 9.10.4-P3 and 9.11.0rc3 patch a previously undisclosed denial-of-service (DoS) flaw that can be exploited using specially crafted DNS request packets. The security hole, tracked as CVE-2016-2776, was uncovered by the ISC and affects all servers that can receive request packets from any source.

“Testing by ISC has uncovered a critical error condition which can occur when a nameserver is constructing a response. A defect in the rendering of messages into packets can cause named to exit with an assertion failure in buffer.c while constructing a response to a query that meets certain criteria,” ISC explained in its advisory. “This assertion can be triggered even if the apparent source address isn’t allowed to make queries (i.e. doesn’t match ‘allow-query’).”

Advance notifications about this vulnerability were sent out on September 14. There is no evidence that the weakness has been exploited in attacks, but users have been advised to update their BIND installations.

The latest BIND releases also patch a medium severity DoS issue (CVE-2016-2775) that was disclosed in mid-July.

“If the lightweight resolver is asked to resolve a query name which, when combined with a search list entry, exceeds the maximum allowable length, the server can terminate due to an error,” ISC described the flaw. “A server which is affected by this defect will terminate with a segmentation fault error, resulting in a denial of service to client programs attempting to resolve names.”

Users have been informed that the details of this vulnerability are publicly available in a bug repository operated by Red Hat.

Related: DoS Vulnerability Patched in BIND

Advertisement. Scroll to continue reading.

Related: Three High Severity DoS Flaws Patched in BIND

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this event as we dive into threat hunting tools and frameworks, and explore value of threat intelligence data in the defender’s security stack.

Register

Learn how integrating BAS and Automated Penetration Testing empowers security teams to quickly identify and validate threats, enabling prompt response and remediation.

Register

People on the Move

SplxAI, a startup focused on securing AI agents, has announced new CISO Sandy Dunn.

Phillip Miller is joining tax preparation giant H&R Block as VP and CISO.

Linx Security has appointed Sarit Reiner Frumkes as Chief Technology Officer.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.