Vulnerability Note VU#559980
ISC Bind 9 IXFR or DDNS update combined with high query rate DoS vulnerability
A denial-of-service condition exists in certain cases when an ISC Bind server processes a IXFR transfer or dynamic update.
The ISC security advisory states:
"When an authoritative server processes a successful IXFR transfer or a dynamic update, there is a small window of time during which the IXFR/update coupled with a query may cause a deadlock to occur. This deadlock will cause the server to stop processing all requests. A high query rate and/or a high update rate will increase the probability of this condition."
An attacker may cause the Bind server to stop processing all requests.
BIND 9.7.1 or 9.7.2 users should upgrade to BIND 9.7.3. Earlier versions are not vulnerable. BIND 9.5 is End of Life and is not supported by ISC. BIND 9.8 is not vulnerable.
The ISC advisory contains the following workaround:
Vendor Information (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Internet Systems Consortium||Affected||24 Jan 2011||23 Feb 2011|
CVSS Metrics (Learn More)
Thanks to ISC for reporting this vulnerability.
This document was written by Jared Allar.
- CVE IDs: CVE-2011-0414
- Date Public: 22 Feb 2011
- Date First Published: 22 Feb 2011
- Date Last Updated: 23 Feb 2011
- Severity Metric: 4.50
- Document Revision: 12
If you have feedback, comments, or additional information about this vulnerability, please send us email.