{"vuid":"VU#559980","idnumber":"559980","name":"ISC Bind 9 IXFR or DDNS update combined with high query rate DoS vulnerability","keywords":["isc","bind","ixfr","ddns","dos"],"overview":"A denial-of-service condition exists in certain cases when an ISC Bind server processes a IXFR transfer or dynamic update.","clean_desc":"The ISC security advisory states: \"When an authoritative server processes a successful IXFR transfer or a dynamic update, there is a small window of time during which the IXFR/update coupled with a query may cause a deadlock to occur. This deadlock will cause the server to stop processing all requests. A high query rate and/or a high update rate will increase the probability of this condition.\"","impact":"An attacker may cause the Bind server to stop processing all requests.","resolution":"BIND 9.7.1 or 9.7.2 users should upgrade to BIND 9.7.3. Earlier versions are not vulnerable. BIND 9.5 is End of Life and is not supported by ISC. BIND 9.8 is not vulnerable.","workarounds":"The ISC advisory contains the following workaround: \"Depending on your performance requirements, a work-around may be available. ISC was not able to reproduce this defect in 9.7.2 using -n 1, which causes named to use only one worker thread, thus avoiding the deadlock. If your server is powerful enough to serve your data with a single processor, this option may be fast to implement until you have time to perform an upgrade.\"","sysaffected":"","thanks":"Thanks to ISC for reporting this vulnerability.","author":"This document was written by Jared Allar.","public":["h","t","t","p",":","/","/","w","w","w",".","i","s","c",".","o","r","g","/","s","o","f","t","w","a","r","e","/","b","i","n","d","/","a","d","v","i","s","o","r","i","e","s","/","c","v","e","-","2","0","1","1","-","0","4","1","4"],"cveids":["CVE-2011-0414"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2011-01-24T15:20:57Z","publicdate":"2011-02-22T00:00:00Z","datefirstpublished":"2011-02-22T17:28:27Z","dateupdated":"2011-02-23T11:36:38Z","revision":13,"vrda_d1_directreport":"1","vrda_d1_population":"3","vrda_d1_impact":"3","cam_widelyknown":"16","cam_exploitation":"4","cam_internetinfrastructure":"17","cam_population":"12","cam_impact":"3","cam_easeofexploitation":"9","cam_attackeraccessrequired":"20","cam_scorecurrent":"4.4955","cam_scorecurrentwidelyknown":"4.9815","cam_scorecurrentwidelyknownexploited":"6.9255","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":4.4955,"vulnote":null}