Vulnerability Update Time:
Vulnerability cause
Design Error
Hazard level
Low
Impact System
Debian bind 9
Unaffected System
Hazards
Remote attackers can exploit this vulnerability to stop the BIND service program from responding.
Attack Conditions
Attackers must access isc bind.
Vulnerability Information
Isc bind is a DNS protocol implementation.
When processing domain updates, an authoritative server has a race condition error. Attackers can trigger this vulnerability through dynamic DNS updates or incremental domain transfer (IXFR. Processing such requests can cause service program deadlocks and denial of service.
In addition, the Bind has a defect in processing the new dnssec ds records recorded by the cache parser, which can cause name resolution failure. Configurations that are not verified using DNSSEC are not affected by this vulnerability.
Test Method
Vendor solutions
You can contact the supplier to obtain the latest patch:
Http://www.debian.org/security/
Vulnerability provider
Florian weilian
Vulnerability message Link
Http://marc.info /? L = full-disclosure & m = 130151312530154 & w = 2