7.8
CVSSv2

CVE-2015-4620

Published: 08/07/2015 Updated: 30/10/2018
CVSS v2 Base Score: 7.8 | Impact Score: 6.9 | Exploitability Score: 10
VMScore: 694
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Summary

name.c in named in ISC BIND 9.7.x up to and including 9.9.x prior to 9.9.7-P1 and 9.10.x prior to 9.10.2-P2, when configured as a recursive resolver with DNSSEC validation, allows remote malicious users to cause a denial of service (REQUIRE assertion failure and daemon exit) by constructing crafted zone data and then making a query for a name in that zone.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

isc bind 9.7.0

isc bind 9.7.1

isc bind 9.7.3

isc bind 9.7.5

isc bind 9.8.0

isc bind 9.8.1

isc bind 9.8.3

isc bind 9.8.5

isc bind 9.9.0

isc bind 9.9.1

isc bind 9.9.3

isc bind 9.9.4

isc bind 9.10.0

isc bind 9.10.1

isc bind 9.7.2

isc bind 9.7.4

isc bind 9.7.6

isc bind 9.7.7

isc bind 9.8.2

isc bind 9.9.7

isc bind 9.8.6

isc bind 9.9.6

isc bind 9.10.2

isc bind 9.8.4

isc bind 9.9.2

isc bind 9.9.5

Vendor Advisories

Debian Bug report logs - #791715 bind9: CVE-2015-4620: Specially Constructed Zone Data Can Cause a Resolver to Crash when Validating Package: src:bind9; Maintainer for src:bind9 is Debian DNS Team <team+dns@trackerdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Tue, 7 Jul 2015 20:00:13 UTC ...
Bind could be made to crash if it received specially crafted network traffic ...
Breno Silveira Soares of Servico Federal de Processamento de Dados (SERPRO) discovered that the BIND DNS server is prone to a denial of service vulnerability A remote attacker who can cause a validating resolver to query a zone containing specifically constructed contents can cause the resolver to terminate with an assertion failure, resulting in ...
A flaw was found in the way BIND performed DNSSEC validation An attacker able to make BIND (functioning as a DNS resolver with DNSSEC validation enabled) resolve a name in an attacker-controlled domain could cause named to exit unexpectedly with an assertion failure ...
A flaw was found in the way BIND performed DNSSEC validation An attacker able to make BIND (functioning as a DNS resolver with DNSSEC validation enabled) resolve a name in an attacker-controlled domain could cause named to exit unexpectedly with an assertion failure ...