search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Overly large OPT record assertion

Vulnerability Note VU#229595

Original Release Date: 2002-11-13 | Last Revised: 2003-05-30

Overview

A remotely exploitable denial-of-service vulnerability exists in BIND. Based on recent reports, we believe this vulnerability is being actively exploited.

Description

A remotely exploitable denial-of-service vulnerability exists in BIND 8.3.0 - 8.3.3. ISC's description of this vulnerability states:

When constucting [sic] a response a NXDOMAIN response to a ENDS query with a large UDP size it is possible to trigger an assertion.

Impact

The BIND daemon will shut down. As a result, clients will not be able to connect to the service to resolve queries.

Solution

Apply a patch from your vendor. In the absence of a patch, you may wish to consider ISC's recommendation, which is upgrading to "BIND 4.9.11, BIND 8.2.7, BIND 8.3.4 or preferably BIND 9." Additionally, ISC indicates, "BIND 4 is officially deprecated. Only security fixes will be issued for BIND 4."

Disable recursion if possible.

Vendor Information

229595
 

View all 101 vendors View less vendors


CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

Internet Security Systems is credited for discovering this vulnerability.

This document was written by Ian A Finlay.

Other Information

CVE IDs: CVE-2002-1220
CERT Advisory: CA-2002-31
Severity Metric: 33.05
Date Public: 2002-11-12
Date First Published: 2002-11-13
Date Last Updated: 2003-05-30 17:06 UTC
Document Revision: 27

Sponsored by CISA.