DNS: ISC BIND RDATA Records Handling Denial of Service

This signature detects attempts to exploit a known vulnerability against ISC BIND. A successful attack can result in a denial-of-service condition.

Extended Description

The RFC 5011 implementation in rdata.c in ISC BIND 9.7.x and 9.8.x before 9.8.5-P2, 9.8.6b1, 9.9.x before 9.9.3-P2, and 9.9.4b1, and DNSco BIND 9.9.3-S1 before 9.9.3-S1-P1 and 9.9.4-S1b1, allows remote attackers to cause a denial of service (assertion failure and named daemon exit) via a query with a malformed RDATA section that is not properly handled during construction of a log message, as exploited in the wild in July 2013.

Affected Products

Hp hp-ux

References

BugTraq: 61479

CVE: CVE-2013-4854

Short Name
DNS:EXPLOIT:ISC-BIND-RDATA-DOS
Severity
Minor
Recommended
False
Recommended Action
Drop
Category
DNS
Keywords
BIND CVE-2013-4854 Denial Handling ISC RDATA Records Service bid:61479 of
Release Date
11/26/2013
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3761
False Positive
Unknown
Vendors

Suse

Slackware

Redhat

Hp

Fedoraproject

Opensuse

Isc

Freebsd

Mandriva

Novell

CVSS Score

7.8

Found a potential security threat?