The vulnerability allows a remote attacker to cause DoS conditions on the target system.
The weakness exists due to an error in the RFC 5011 implementation in rdata.c when parsing RDATA within a DNS query. By using a query with a malformed RDATA section that is not properly handled during construction of a log message, a remote attacker can cause an assertion failure and named daemon exit.
Successful exploitation of the vulnerability results in denial of service on the vulnerable system.
Note: the vulnerability was being actively exploited.
Denial of service
The vulnerability allows a remote attacker to cause DoS conditions on the target system.
The weakness exists due to an error in the RFC 5011 implementation in rdata.c when parsing RDATA within a DNS query. By using a query with a malformed RDATA section that is not properly handled during construction of a log message, a remote attacker can cause an assertion failure and named daemon exit.
Successful exploitation of the vulnerability results in denial of service on the vulnerable system.
Note: the vulnerability was being actively exploited.
i
We are aware of in the wild exploitation of this vulnerability before official patch release.
This vulnerability was discovered by Maxim Shudrak.
Software:
ISC BIND
We are aware of in the wild exploitation of this vulnerability before official patch release.
This vulnerability was discovered by Maxim Shudrak.