|
|||
Rule General Information |
---|
Release Date: | 2019-06-28 | |
Rule Name: | ISC BIND rndc Control Channel Assertion Failure Denial of Service Vulnerability -4 (CVE-2016-1285) | |
Severity: | ||
CVE ID: | ||
Rule Protection Details |
---|
Description: | named in ISC BIND 9.x before 9.9.8-P4 and 9.10.x before 9.10.3-P4 does not properly handle DNAME records when parsing fetch reply messages, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a malformed packet to the rndc (aka control channel) interface, related to alist.c and sexpr.c. | |
Impact: | An attacker can launch a denial of service attack by exploiting the vulnerability successfully. | |
Affected OS: | Windows, Linux, FreeBSD, Solaris, Other Unix, Network Device, Mac OS, iOS, Android, Others | |
Reference: | SecurityTrackerID:1035236 http://lists.fedoraproject.org/pipermail/package-announce/2016-April/181036.html http://lists.fedoraproject.org/pipermail/package-announce/2016-April/181037.html http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178831.html |
|
Solutions |
---|
The vendors have released upgrade patches to fix vulnerabilities, please visit: https://kb.isc.org/article/AA-01352 |