>Number:         158882
>Category:       misc
>Synopsis:       CVE-2011-2464 - ISC BIND 9 Remote packet Denial of Service 
>against Authoritative and Recursive Servers
>Confidential:   no
>Severity:       critical
>Priority:       high
>Responsible:    freebsd-bugs
>State:          open
>Quarter:        
>Keywords:       
>Date-Required:
>Class:          sw-bug
>Submitter-Id:   current-users
>Arrival-Date:   Thu Jul 14 03:50:04 UTC 2011
>Closed-Date:
>Last-Modified:
>Originator:     Marcelo Gondim
>Release:        8.2
>Organization:
Nettel Telecom
>Environment:
FreeBSD zeus.linuxinfo.com.br 8.2-STABLE FreeBSD 8.2-STABLE #3: Sun Jul  3 
16:31:06 BRT 2011     r...@zeus.linuxinfo.com.br:/usr/obj/usr/src/sys/GONDIM  
amd64
>Description:
I received the following information:

##########################################################################
ISC BIND 9 Remote packet Denial of Service against Authoritative and
Recursive Servers

A specially constructed packet will cause BIND 9 ("named") to exit,
affecting DNS service.

CVE: CVE-2011-2464

Document Version:  2.0

Posting date: 05 Jul 2011

Program Impacted: BIND

Versions affected:  9.6.3, 9.6-ESV-R4, 9.6-ESV-R4-P1, 9.6-ESV-R5b1 9.7.0,
9.7.0-P1, 9.7.0-P2, 9.7.1, 9.7.1-P1, 9.7.1-P2, 9.7.2, 9.7.2-P1, 9.7.2-P2,
9.7.2-P3, 9.7.3, 9.7.3-P1, 9.7.3-P2, 9.7.4b1 9.8.0, 9.8.0-P1, 9.8.0-P2,
9.8.0-P3, 9.8.1b1

Severity:  High

Exploitable:  Remotely

Description: 

A defect in the affected BIND 9 versions allows an attacker to remotely
cause the "named" process to exit using a specially crafted packet. This
defect affects both recursive and authoritative servers. The code location
of the defect makes it impossible to protect BIND using ACLs configured
within named.conf or by disabling any features at compile-time or run-time.

A remote attacker would need to be able to send a specially crafted packet
directly to a server running a vulnerable version of BIND. There is also
the potential for an indirect attack via malware that is inadvertently
installed and run, where infected machines have direct access to an
organization's nameservers.

CVSS Score: 7.8

(AV:N/AC:L/Au:N/C:N/I:N/A:C)

For more information on the Common Vulnerability Scoring System and to
obtain your specific environmental score please visit:
http://nvd.nist.gov/cvss.cfm?calculator&adv&version=2

Workarounds: 

There are no known workarounds for publicly available servers.
Administrators of servers that are not publicly available may be able to
limit exposure via firewalls and packet filters.

Active exploits: 

ISC knows of no public tools to exploit this defect at the time of this
advisory.

Solution: 

Upgrade to: 9.6-ESV-R4-P3, 9.7.3-P3 or 9.8.0-P4.
########################################################################

The bind9 version of FreeBSD 8.2-STABLE is:

root@zeus)[~]# named -v
BIND 9.6.-ESV-R4-P1

We are vulnerable? Because our version is included in the listing.




>How-To-Repeat:

>Fix:
Upgrade to: 9.6-ESV-R4-P3, 9.7.3-P3 or 9.8.0-P4.

>Release-Note:
>Audit-Trail:
>Unformatted:
_______________________________________________
freebsd-bugs@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"

Reply via email to