Source |
Fortinet |
Identifiant |
250043 |
Date de publication |
2016-11-08 10:49:54 (vue: 2016-11-08 10:49:54) |
Titre |
Analysis of ISC BIND DNAME Answer Handling DoS (CVE-2016-8864) |
Texte |
A defect in BIND's handling of a DNAME answer was fixed in a critical update from the Internet Systems Consortium (ISC) several days ago. This defect affects all BIND recursive servers, and can be exploited to remotely take down recursive servers by sending a simple DNAME answer thereby causing a denial of service (DoS.)
This potential DoS vulnerability is caused by an assertion failure in Resolver.c or Db.c when caching the DNS response with DNAME Record. In this post we will examine the underlying code and expose the root cause of this... |
Notes |
|
Envoyé |
Oui |
Condensat |
2016 8864 affects ago all analysis answer assertion bind caching can cause caused causing code consortium critical cve days defect denial dname dns dos down examine exploited expose failure fixed from handling internet isc post potential record recursive remotely resolver response root sending servers service several simple systems take thereby underlying update vulnerability when will |
Tags |
|
Stories |
|
Move |
|