Vulnerability Note VU#510208

ISC BIND named allow-query vulnerability

Original Release date: 01 Dec 2010 | Last revised: 01 Dec 2010


ISC BIND contains a vulnerability in the processing of the allow-query access control specifier.


According to ISC:

When named is running as an authoritative server for a zone and receives a query for that zone data, it first checks for allow-query acls in the zone statement, then in that view, then in global options. If none of these exist, it defaults to allowing any query (allow-query {"any"};).
With this bug, if the allow-query is not set in the zone statement, it failed to check in view or global options and fell back to the default of allowing any query. This means that queries that the zone owner did not wish to allow were incorrectly allowed.

This bug doesn't affect allow-recursion or allow-query-cache acls, since they are not relevant to a zone for which the server is authoritative.


The configured acl is not correctly applied, allowing queries that the owner did not wish to allow.


Apply an update

Users who obtain BIND from a third-party vendor, such as their operating system vendor, should see the vendor information portion of this document for a partial list of affected vendors.

This vulnerability is addressed in ISC BIND version 9.7.2-P3. Users of BIND from the original source distribution should upgrade to this version.

See also

Vendor Information (Learn More)

VendorStatusDate NotifiedDate Updated
Internet Systems ConsortiumAffected-01 Dec 2010
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A



Thanks to Internet Systems Consortium for reporting this vulnerability.

This document was written by Michael Orlando.

Other Information

  • CVE IDs: CVE-2010-3615
  • Date Public: 01 Dec 2010
  • Date First Published: 01 Dec 2010
  • Date Last Updated: 01 Dec 2010
  • Severity Metric: 7.65
  • Document Revision: 19


If you have feedback, comments, or additional information about this vulnerability, please send us email.