{"vuid":"VU#714121","idnumber":"714121","name":"Incorrect NXDOMAIN responses from AAAA queries could cause denial-of-service conditions","keywords":["IPv6","Name Resolution","IPv4","name servers","negative caching","cache","DNS","NXDOMAIN","AAAA"],"overview":"Some DNS servers respond with an inappropriate error message if queried for nonexistent AAAA records, which can lead to possible denial of service.","clean_desc":"Some DNS servers respond with a \"Name Error\" response code (NXDOMAIN, RCODE 3) instead of \"No Error\" (RCODE 0) when queried for a nonexistent AAAA record. (AAAA records are used to provide name-to-address resolution for IPv6 addresses, as described in RFC1886.) When an NXDOMAIN response code is received, the querying resolver will usually stop attempting to resolve that name. Resolvers that support negative caching (RFC2308)  and receive an NXDOMAIN response will not query for A records for the same resource until the negatively cached error response has expired. Sites operating DNS servers that respond to queries for nonexistent AAAA records with NXDOMAIN response codes may be susceptible to attackers using other sites' caching nameservers to block those other sites' users from resolving records in domains served by the broken DNS servers. Similar attacks may be possible against caching resolvers if an attacker were able to induce the resolver to look up a nonexistent AAAA record from a server acting in this manner. Note: The same issue occurs with A6 records. However, A6 records (RFC2874) have been deemed \"Experimental\" by the IETF, with preference being given to AAAA records (RFC3363, RFC3364). This is not a new issue. The NXDOMAIN in response to a AAAA query issue was noted in the (now expired) Internet Draft\ndraft-itojun-jinmei-ipv6-issues-00.txt: There are broken DNS servers that return NXDOMAIN against AAAA queries, when it should return NOERROR with empty return records. When deploying IPv6/v4 dual stack node, it becomes problem because dual stack nodes would query AAAA first, see NXDOMAIN error, and won't try to query A records. These broken DNS servers need to be corrected. However, we have not seen this issue documented elsewhere as a potential denial-of-service attack vector against sites with their DNS servers broken in this manner.","impact":"An attacker could create a localized denial-of-service condition by exploting this vulnerability.","resolution":"Apply a patch from your vendor.","workarounds":"","sysaffected":"","thanks":"","author":"This document was written by Allen D Householder.","public":["ftp://ftp.rfc-editor.org/in-notes/rfc1886.txt","ftp://ftp.rfc-editor.org/in-notes/rfc2308.txt","ftp://ftp.rfc-editor.org/in-notes/rfc2874.txt","ftp://ftp.rfc-editor.org/in-notes/rfc3363txt","ftp://ftp.rfc-editor.org/in-notes/rfc3364.txt","http://www1.ietf.org/mail-archive/ietf-announce/Current/msg19416.html"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2003-03-05T18:55:54Z","publicdate":"2003-02-24T00:00:00Z","datefirstpublished":"2003-03-26T18:58:54Z","dateupdated":"2003-05-23T13:46:18Z","revision":12,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"10","cam_exploitation":"0","cam_internetinfrastructure":"19","cam_population":"15","cam_impact":"3","cam_easeofexploitation":"20","cam_attackeraccessrequired":"20","cam_scorecurrent":"9.7875","cam_scorecurrentwidelyknown":"13.1625","cam_scorecurrentwidelyknownexploited":"19.9125","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":9.7875,"vulnote":null}