Short Name |
DNS:BIND-RRSIG-DOS |
---|---|
Severity |
High |
Recommended |
No |
Recommended Action |
Drop |
Category |
DNS |
Keywords |
ISC BIND RRSIG RRsets Denial of Service |
Release Date |
2011/08/02 |
Update Number |
1965 |
Supported Platforms |
idp-4.0+, isg-3.4+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detects attempts to exploit a known vulnerability in ISC BIND. The vulnerability is caused by an off-by-one error which further leads to an assertion failure when processing very large RRSIG RRsets in a negative response. An remote attacker may exploit this vulnerability through querying a targeted caching resolver for non-existent names in the domain served by the attacker controlled server. Successful exploitation would result an assertion failure in a server resulting in server crash, leading to denial of service condition.
ISC BIND is prone to a remote denial-of-service vulnerability because the software fails to properly handle certain resource record sets (RRsets). An attacker can exploit this issue to cause the application process to crash, denying service to legitimate users.