vendor:
BIND 9
by:
elceef
7.5
CVSS
HIGH
Denial of Service
400
CWE
Product Name: BIND 9
Affected Version From: ISC BIND 9
Affected Version To: ISC BIND 9
Patch Exists: YES
Related CWE: CVE-2015-5477
CPE: a:isc:bind:9
Metasploit:
https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2016-0078/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2016-0079/, https://www.rapid7.com/db/vulnerabilities/amazon-linux-ami-alas-2015-573/, https://www.rapid7.com/db/vulnerabilities/dns-bind-cve-2015-5477/, https://www.rapid7.com/db/vulnerabilities/juniper-junos-os-jsa10718/, https://www.rapid7.com/db/vulnerabilities/hpux-cve-2015-5477/, https://www.rapid7.com/db/vulnerabilities/aix-6.1.8-bind9_advisory8_cve-2015-5477/, https://www.rapid7.com/db/vulnerabilities/aix-5.3.12-bind9_advisory8_cve-2015-5477/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2015-1513/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2015-1515/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2015-1514/, https://www.rapid7.com/db/vulnerabilities/oracle_linux-cve-2015-5477/, https://www.rapid7.com/db/vulnerabilities/centos_linux-cve-2015-5477/, https://www.rapid7.com/db/vulnerabilities/gentoo-linux-cve-2015-5477/, https://www.rapid7.com/db/vulnerabilities/aix-7.1.2-bind9_advisory8_cve-2015-5477/, https://www.rapid7.com/db/vulnerabilities/aix-7.1.3-bind9_advisory8_cve-2015-5477/, https://www.rapid7.com/db/vulnerabilities/aix-6.1.9-bind9_advisory8_cve-2015-5477/, https://www.rapid7.com/db/vulnerabilities/ibm-aix-cve-2015-5477/, https://www.rapid7.com/db/vulnerabilities/alpine-linux-cve-2015-5477/, https://www.rapid7.com/db/vulnerabilities/oracle-solaris-cve-2015-5477/, https://www.rapid7.com/db/?q=CVE-2015-5477&type=&page=2, https://www.rapid7.com/db/?q=CVE-2015-5477&type=&page=2
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: multiple
2015
PoC for BIND9 TKEY DoS
This exploit is a proof of concept for a denial of service vulnerability in ISC BIND 9. It sends a specially crafted packet to the target, which causes the server to crash.
Mitigation:
Upgrade to the latest version of BIND 9, which includes a patch for this vulnerability.