Date: Thu, 09 Nov 2000 09:58:55 -0800 From: Michael Bryan <fbsd-secure@ursine.com> To: freebsd-security@freebsd.org Subject: DOS vulnerability in BIND 8.2.2-P5 Message-ID: <3A0AE5DF.39893E59@ursine.com>
next in thread | raw e-mail | index | archive | help
For those who haven't yet seen the messages in BugTraq, there is a DOS vulnerability in BIND 8.2.2-P5. Sending a ZXFR request to a server can cause it to crash. (The crash might happen a few minutes after the ZXFR request, as it sets something up for a later failure.) If BIND is setup to restrict zone transfers to only those hosts that you trust, only those hosts can trigger the bug, so that's the easiest way to protect yourself. Sites that don't have an "allow-transfer" acl restriction on zone transfers are wide open to this DOS attack, though, and there are apparently a lot of sites which are wide open like this. The original BugTraq article is here: http://www.securityfocus.com/archive/1/143843 It appears that 8.2.3-T5B, 8.2.3-T6B and 9.0.0 are not vulnerable, but 8.2.2-P3 and 8.2.2-P5 have been confirmed to be vulnerable under FreeBSD. To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?3A0AE5DF.39893E59>
