Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 09 Nov 2000 09:58:55 -0800
From:      Michael Bryan <fbsd-secure@ursine.com>
To:        freebsd-security@freebsd.org
Subject:   DOS vulnerability in BIND 8.2.2-P5
Message-ID:  <3A0AE5DF.39893E59@ursine.com>

next in thread | raw e-mail | index | archive | help


For those who haven't yet seen the messages in BugTraq, there is
a DOS vulnerability in BIND 8.2.2-P5.  Sending a ZXFR request to
a server can cause it to crash.  (The crash might happen a few
minutes after the ZXFR request, as it sets something up for a later
failure.)  If BIND is setup to restrict zone transfers to only those
hosts that you trust, only those hosts can trigger the bug, so that's
the easiest way to protect yourself.  Sites that don't have an
"allow-transfer" acl restriction on zone transfers are wide open to
this DOS attack, though, and there are apparently a lot of sites
which are wide open like this.


The original BugTraq article is here:

http://www.securityfocus.com/archive/1/143843

It appears that 8.2.3-T5B, 8.2.3-T6B and 9.0.0 are not vulnerable,
but 8.2.2-P3 and 8.2.2-P5 have been confirmed to be vulnerable under
FreeBSD.


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?3A0AE5DF.39893E59>