{"vuid":"VU#542123","idnumber":"542123","name":"ISC BIND 9 resolver cache vulnerability","keywords":["isc","bind","resolver","cache"],"overview":"ISC BIND 9 resolver contains a vulnerability that could allow a attacker to keep a domain name in the cache even after it has been deleted from registration.","clean_desc":"According to ISC: ISC has been notified by Haixin Duan (a professor at Tsinghua University in Beijing China, who is currently visiting the International Computer Science Institute (ICSI) at the University of California, Berkeley) about a DNS resolver vulnerability. This vulnerability allows a miscreant to keep a domain name in the cache even after it has been deleted from registration. ISC is evaluating the risk of this vulnerability, but the published paper shows how this was done live across the Internet. It lists several DNS implementations and open resolver deployments as vulnerable. The exploit was presented at the NDSS conference: \"Ghost Domain Names: Revoked Yet Still Resolvable.\"","impact":"A remote, unauthenticated attacker can cause the BIND 9 resolver to keep a domain name in the cache even after it has been deleted from registration.","resolution":"We are currently unaware of a practical solution to this problem.","workarounds":"","sysaffected":"","thanks":"The Internet Systems Consortium thanks the following people for reporting this vulnerability: Jian Jiang, Network Research Center, Tsinghua University\nHaixin Duan, Network Research Center, Tsinghua University\nJianping Wu, Network Research Center, Tsinghua University\nKang Li, Department of Computer Science, University of Georgia\nJun Li, University of Oregon Carlos III University of Madrid, Institute IMDEA Networks\nJinjin Liang, Network Research Center Tsinghua University\nNicholas Weaver, International Computer Science Institute (ICSI)","author":"This document was written by Michael Orlando.","public":["https://www.isc.org/software/bind/advisories/cve-2012-1033","http://www.internetsociety.org/events/ndss-symposium-2012/symposium-program/feb08"],"cveids":["CVE-2012-1033"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2012-02-08T15:05:52Z","publicdate":"2012-02-07T00:00:00Z","datefirstpublished":"2012-02-08T18:43:26Z","dateupdated":"2012-07-23T21:07:14Z","revision":71,"vrda_d1_directreport":"0","vrda_d1_population":"4","vrda_d1_impact":"4","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"19","cam_population":"20","cam_impact":"6","cam_easeofexploitation":"13","cam_attackeraccessrequired":"20","cam_scorecurrent":"19.89","cam_scorecurrentwidelyknown":"22.815","cam_scorecurrentwidelyknownexploited":"34.515","ipprotocol":"","cvss_accessvector":"N","cvss_accesscomplexity":"L","cvss_authentication":null,"cvss_confidentialityimpact":"N","cvss_integrityimpact":"P","cvss_availabilityimpact":"N","cvss_exploitablity":null,"cvss_remediationlevel":"OF","cvss_reportconfidence":"C","cvss_collateraldamagepotential":"ND","cvss_targetdistribution":"H","cvss_securityrequirementscr":"ND","cvss_securityrequirementsir":"ND","cvss_securityrequirementsar":"ND","cvss_basescore":"5","cvss_basevector":"AV:N/AC:L/Au:N/C:N/I:P/A:N","cvss_temporalscore":"3.9","cvss_environmentalscore":"3.9","cvss_environmentalvector":"CDP:ND/TD:H/CR:ND/IR:ND/AR:ND","metric":19.89,"vulnote":null}