{"vuid":"VU#142646","idnumber":"142646","name":"ISC BIND 9 named denial of service vulnerability","keywords":["ISC","bind","named"],"overview":"ISC BIND 9 contains a remote packet denial of service vulnerability when running as an authoritative or recursive server.","clean_desc":"According to ISC: A defect in the affected BIND 9 versions allows an attacker to remotely cause the \"named\" process to exit using a specially crafted packet. This defect affects both recursive and authoritative servers. The code location of the defect makes it impossible to protect BIND using ACLs configured within named.conf or by disabling any features at compile-time or run-time. A remote attacker would need to be able to send a specially crafted packet directly to a server running a vulnerable version of BIND. There is also the potential for an indirect attack via malware that is inadvertently installed and run, where infected machines have direct access to an organization's nameservers.","impact":"A remote, unauthenticated attacker can cause the named daemon to crash creating a denial of service condition.","resolution":"Apply an update Users who obtain BIND from a third-party vendor, such as their operating system vendor, should see the vendor information portion of this document for a partial list of affected vendors. This vulnerability is addressed in ISC BIND versions 9.6-ESV-R4-P3, 9.7.3-P3 and 9.8.0-P4. Users of BIND from the original source distribution should upgrade to this version. See also http://www.isc.org/software/bind/advisories/cve-2011-2464","workarounds":"","sysaffected":"","thanks":"Thanks to Internet Systems Consortium for reporting this vulnerability.","author":"This document was written by Michael Orlando.","public":["h","t","t","p",":","/","/","w","w","w",".","i","s","c",".","o","r","g","/","s","o","f","t","w","a","r","e","/","b","i","n","d","/","a","d","v","i","s","o","r","i","e","s","/","c","v","e","-","2","0","1","1","-","2","4","6","4"],"cveids":["CVE-2011-2464"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2011-06-16T12:23:41Z","publicdate":"2011-07-05T00:00:00Z","datefirstpublished":"2011-07-05T17:39:24Z","dateupdated":"2011-07-20T18:57:49Z","revision":15,"vrda_d1_directreport":"1","vrda_d1_population":"4","vrda_d1_impact":"4","cam_widelyknown":"6","cam_exploitation":"0","cam_internetinfrastructure":"19","cam_population":"17","cam_impact":"8","cam_easeofexploitation":"14","cam_attackeraccessrequired":"20","cam_scorecurrent":"17.85","cam_scorecurrentwidelyknown":"27.846","cam_scorecurrentwidelyknownexploited":"42.126","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":17.85,"vulnote":null}