RULE(RULE ID:712882)

Rule General Information
Release Date: 2019-06-28
Rule Name: ISC BIND rndc Control Channel Assertion Failure Denial of Service Vulnerability -4 (CVE-2016-1285)
Severity:
CVE ID:
Rule Protection Details
Description: named in ISC BIND 9.x before 9.9.8-P4 and 9.10.x before 9.10.3-P4 does not properly handle DNAME records when parsing fetch reply messages, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a malformed packet to the rndc (aka control channel) interface, related to alist.c and sexpr.c.
Impact: An attacker can launch a denial of service attack by exploiting the vulnerability successfully.
Affected OS: Windows, Linux, FreeBSD, Solaris, Other Unix, Network Device, Mac OS, iOS, Android, Others
Reference: SecurityTrackerID:1035236
http://lists.fedoraproject.org/pipermail/package-announce/2016-April/181036.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-April/181037.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178831.html
Solutions
The vendors have released upgrade patches to fix vulnerabilities, please visit:
https://kb.isc.org/article/AA-01352