Infoblox Information for VU#697164

BIND vulnerable to an INSIST failure via sending of multiple recursive queries

Status

Not Affected

Vendor Statement

The ISC BIND software Infoblox uses contains the underlying flaw, but
Infoblox does not believe the vulnerability is exposed.  Nonetheless,
Infoblox has issued a patch to fix the underlying flaw and new releases
of Infoblox NIOS software, DNSone 3.2r11-1 or NIOS 4.0.r1-3, are
available for download.  Infoblox recommends that customers upgrade to
DNSone 3.2r11-1 or NIOS 4.0.r1-3.  For more information and to download
patches, please visit the Infoblox Support web site at
http://www.infoblox.com/support.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Vendor References

None

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.