ISC BIND 9 contains a remote packet denial of service vulnerability when running as an authoritative or recursive server.
According to ISC:
A defect in the affected BIND 9 versions allows an attacker to remotely cause the "named" process to exit using a specially crafted packet. This defect affects both recursive and authoritative servers. The code location of the defect makes it impossible to protect BIND using ACLs configured within named.conf or by disabling any features at compile-time or run-time.
A remote, unauthenticated attacker can cause the named daemon to crash creating a denial of service condition.
Apply an update
Internet Systems Consortium
Mandriva S. A.
Red Hat, Inc.
Thanks to Internet Systems Consortium for reporting this vulnerability.
This document was written by Michael Orlando.
|Date First Published:||2011-07-05|
|Date Last Updated:||2011-07-20 18:57 UTC|