BIND DNS server vuln...
- http://h-online.com/-1727232
10 Oct 2012 - "The Internet Systems Consortium (ISC) is warning users of a critical vulnerability in the free BIND DNS server that can be exploited by an attacker to cause a denial-of-service (DoS) condition. According to the ISC, the security issue (CVE-2012-5166*) is caused by a problem when processing a specially crafted combination of resource records (RDATA). When loaded, this data can cause a name server to lock up. The ISC says that, when this happens, normal functionality can only be restored by terminating and restarting the named daemon. Affected versions include 9.2.x to 9.6.x, 9.4-ESV to 9.4-ESV-R5-P1, 9.6-ESV to 9.6-ESV-R7-P3, 9.7.0 to 9.7.6-P3, 9.8.0 to 9.8.3-P3 and 9.9.0 to 9.9.1-P3. The ISC notes that while versions 9.2, 9.3, 9.4 and 9.5 of BIND are vulnerable, these branches are considered to be "end of life" (EOL) and are no longer updated. Upgrading to 9.7.7, 9.7.6-P4, 9.6-ESV-R8, 9.6-ESV-R7-P4, 9.8.4, 9.8.3-P4, 9.9.2 or 9.9.1-P4 corrects the problem. Alternatively, as a workaround, users can set the "minimal-responses" option to "yes" in order to prevent the lockup. The ISC says that it currently knows of no active exploits. The new releases are available from the ISC's downloads page**; all users are advised to update to the latest versions."
* https://kb.isc.org/article/AA-00801
Last Updated: 2012-10-09
- https://www.isc.org/...s/cve-2012-5166
** https://www.isc.org/downloads/all
> https://www.isc.org/...security/matrix
___
- http://www.securityt....com/id/1027642
CVE Reference: http://web.nvd.nist....d=CVE-2012-5166 - 7.8 (HIGH)
Oct 11 2012
Solution: The vendor has issued a fix (9.6-ESV-R8, 9.6-ESV-R7-P4, 9.7.7, 9.7.6-P4, 9.8.4, 9.8.3-P4, 9.9.2, 9.9.1-P4).
The vendor's advisory is available at: https://kb.isc.org/article/AA-00801
- https://secunia.com/advisories/50878/
Release Date: 2012-10-10
Criticality level: Moderately critical
Impact: DoS
Where: From remote...
CVE Reference: CVE-2012-5166
Solution: Update to a fixed release... see the vendor's advisory for details.
Original Advisory: https://kb.isc.org/article/AA-00801
Edited by AplusWebMaster, 15 October 2012 - 05:57 AM.