ADVISORY!

TLP : CLEAR

Date : 25/07/2024

REF NO : CERT / 2024/07/66

ISC BIND Denial of Service Vulnerabilities

Severity Level: Medium

Components Affected

  • BIND version 9.11.0 to 9.11.37
  • BIND version 9.16.0 to 9.16.50
  • BIND version 9.18.0 to 9.18.27
  • BIND version 9.19.0 to 9.19.24
  • BIND Supported Preview Edition version 9.9.3-S1 to 9.11.37-S1
  • BIND Supported Preview Edition version 9.11.33-S1 to 9.11.37-S1
  • BIND Supported Preview Edition version 9.16.8-S1 to 9.16.50-S1
  • BIND Supported Preview Edition version 9.18.11-S1 to 9.18.27-S1

Overview

Multiple vulnerabilities were identified in ISC BIND. A remote attacker could exploit some of these vulnerabilities to trigger denial of service condition on the targeted system.

Description

The BIND 9 DNS server is affected by several vulnerabilities across multiple versions, which could lead to server instability and performance degradation. A malicious client could exploit these issues by sending a large number of DNS messages over TCP, potentially causing server instability. Additionally, resolver caches and authoritative zone databases with numerous Resource Records (RRs) for the same hostname may experience performance degradation during content updates or client queries. If a server hosts a zone with a “KEY” Resource Record, or if a resolver DNSSEC-validates a “KEY” Resource Record from a DNSSEC-signed domain, an attacker could exhaust CPU resources by sending a stream of SIG(0) signed requests. Furthermore, client queries that trigger the serving of stale data and require lookups in local authoritative zone data may result in an assertion failure. These issues affect various versions of BIND 9, from 9.0.0 through 9.19.24, including specific security-enhanced (S1) versions.

Impact

  • Denial of Service

Solution/ Workarounds

Before installation of the software, please visit the vendor web-site for more details.

Apply fixes issued by the vendor:

  • BIND version 9.18.28
  • BIND version 9.20.0
  • BIND Supported Preview Edition version 9.18.28-S1

Reference

Disclaimer : The information provided herein is on an “as is” basis, without warranty of any kind.

Sri Lanka Computer Emergency Readiness Team | Coordination Centre

Copyright © 2023 SRI LANKA CERT | CC