Release date:
Updated on:
Affected Systems:
Isc bind 9.x
Description:
--------------------------------------------------------------------------------
Bugtraq id: 61774
BIND is a widely used DNS protocol.
The SRTT Algorithm Implementation in isc bind 9 has a vulnerability. Theoretically, this vulnerability allows attackers to manually reduce the SRTT value associated with the recursive server and the authorization server, therefore, the authorization server determines the Domain Server to be queried from the NS resource record set value. SRTT selection not only affects the authorization server, but also the recursive or Authorized Hybrid server. Attackers can exploit this vulnerability to perform DNS-related attacks, such as DNS cache poisoning.
<* Source: Roee Hay
Jonathan Kalechstei
Gabi Nakibly
Link: https://kb.isc.org/article/AA-01030
*>
Suggestion:
--------------------------------------------------------------------------------
Vendor patch:
ISC
---
Currently, the vendor does not provide patches or upgrade programs. We recommend that users who use the software follow the vendor's homepage to obtain the latest version:
Http://www.isc.org/software/bind/advisories/