Arch Linux Security Advisory ASA-201412-7
========================================
Severity: High
Date    : 2014-12-08
CVE-ID  : CVE-2014-8500
Package : bind
Type    : denial of service
Remote  : Yes
Link    : https://wiki.archlinux.org/title/CVE-2014

Summary
======
The package bind before version 9.10.1.P1-1 is vulnerable to denial of
service.

Resolution
=========
Upgrade to 9.10.1.P1-1.

# pacman -Syu "bind>=9.10.1.P1-1"

The problem has been fixed upstream in version 9.10.1.P1.

Workaround
=========
None.

Description
==========
By making use of maliciously-constructed zones or a rogue server, an
attacker can exploit an oversight in the code BIND 9 uses to follow
delegations in the Domain Name Service, causing BIND to issue unlimited
queries in an attempt to follow the delegation. This can lead to
resource exhaustion and denial of service (up to and including
termination of the named server process).

Impact
=====
A remote attacker is able to make use of maliciously-constructed zones
or a rogue server that can lead to resource exhaustion and denial of
service.

References
=========
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8500

ArchLinux: 201412-7: bind: denial of service

December 8, 2014

Summary

By making use of maliciously-constructed zones or a rogue server, an attacker can exploit an oversight in the code BIND 9 uses to follow delegations in the Domain Name Service, causing BIND to issue unlimited queries in an attempt to follow the delegation. This can lead to resource exhaustion and denial of service (up to and including termination of the named server process).

Resolution

Upgrade to 9.10.1.P1-1. # pacman -Syu "bind>=9.10.1.P1-1"
The problem has been fixed upstream in version 9.10.1.P1.

References

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8500

Severity
Package : bind
Type : denial of service
Remote : Yes
Link : https://wiki.archlinux.org/title/CVE-2014

Workaround

None.

Related News