{"vuid":"VU#198355","idnumber":"198355","name":"ISC BIND 8.2.2-P6 vulnerable to DoS when processing SRV records, aka the \"srv bug\"","keywords":["BIND","ISC","SRV","srv bug","DoS","denial of service"],"overview":"There is a denial-of-service vulnerability in several versions of the Internet Software Consortium's (ISC) BIND software. This vulnerability is referred to by the ISC as  the \"srv bug\" and affects ISC BIND versions 8.2 through 8.2.2-P6.","clean_desc":"This vulnerability can cause affected DNS servers running named to go into an infinite loop, thus preventing further name requests to be handled. This can happen if an SRV record (defined in RFC2782) is sent to the vulnerable server. Microsoft's Windows 2000 Active Directory service makes extensive use of SRV records and is reportedly capable of triggering this bug in the course of normal operations. This is not, however, a vulnerability in Microsoft Active Directory. Any network client capable of sending SRV records to vulnerable name server systems can exercise this vulnerability.","impact":"A remote attacker can use malicious SRV records to crash vulnerable BIND servers, resulting in a denial-of-service condition that disables name resolution service.","resolution":"Apply a patch from your vendor To address this vulnerability, the CERT/CC recommends that all users of ISC BIND upgrade to version 8.2.2-P7, which patches both VU#198355 and VU#715973. For information regarding vendor-specific versions of DNS software, please consult the Systems Affected section of this document.","workarounds":"","sysaffected":"","thanks":"The CERT Coordination Center thanks Mark Andrews, David Conrad, and Paul Vixie of the ISC for developing a solution and assisting in the preparation of this document.","author":"This document was written by Jeffrey S. Havrilla and Jeffrey P. Lanza.","public":["http://www.isc.org/products/BIND/bind8.html","http://www.isc.org/products/BIND/bind-security.html"],"cveids":["CVE-2000-0888"],"certadvisory":"CA-2000-20","uscerttechnicalalert":null,"datecreated":"2000-11-10T22:31:33Z","publicdate":"2000-11-07T00:00:00Z","datefirstpublished":"2001-05-11T13:44:25Z","dateupdated":"2002-01-25T21:41:31Z","revision":10,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"10","cam_internetinfrastructure":"19","cam_population":"18","cam_impact":"5","cam_easeofexploitation":"15","cam_attackeraccessrequired":"15","cam_scorecurrent":"16.70625","cam_scorecurrentwidelyknown":"18.6046875","cam_scorecurrentwidelyknownexploited":"22.4015625","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":16.70625,"vulnote":null}