Thread-topic: [SA19808] BIND Zone Transfer TSIG Handling Denial of Service
>
>
> TITLE:
> BIND Zone Transfer TSIG Handling Denial of Service
>
> SECUNIA ADVISORY ID:
> SA19808
>
> VERIFY ADVISORY:
> http://secunia.com/advisories/19808/
>
> CRITICAL:
> Less critical
>
> IMPACT:
> DoS
>
> WHERE:
> From remote
>
> SOFTWARE:
> ISC BIND 9.3.x
> http://secunia.com/product/4298/
> ISC BIND 9.2.x
> http://secunia.com/product/75/
> ISC BIND 8.x.x
> http://secunia.com/product/76/
> ISC BIND 4.x.x
> http://secunia.com/product/740/
>
> DESCRIPTION:
> A vulnerability been reported in ISC BIND, which can be exploited by
> malicious people to cause a DoS (Denial of Service).
>
> The vulnerability is caused due to an error within the handling of
> the TSIG in the second or subsequent messages in a zone transfer.
> This can be exploited to crash "named" via a malformed TSIG in the
> messages.
>
> Successful exploitation requires that the first zone transfer message
> have a valid TSIG.
>
> SOLUTION:
> The vulnerability will reportedly be fixed in a future release.
>
> Do not accept zone-transfers from non-trusted nameservers.
>
> PROVIDED AND/OR DISCOVERED BY:
> Reported by vendor based on DNS Test Tool created by Oulu University
> Secure Programming Group.
>
> ORIGINAL ADVISORY:
> NISCC:
> http://www.niscc.gov.uk/niscc/docs/re-20060425-00312.pdf?lang=en
>