Date: 30 July 2013
The purpose of this advisory is to raise awareness of a vulnerability in BIND.
BIND is the most widely used Domain Name System (DNS) software on the Internet. The current version has a vulnerability that, if exploited, could lead to a crash (terminate abnormally) and result in a denial of service(DoS). The issue resides in the processing of the malformed rdata which can cause named to terminate with an assertion failure while rejecting the malformed query. The exploitation of this vulnerability may cause various issues for the servers hosting BIND, as noted above.
CVE References: CVE-2013-4854
- BIND versions: 9.7.0 -> 9.7.7
- Subscription: 9.9.3-S1 and 9.9.4-S1b1
CCIRC recommends that system administrators identify their affected assets and potential interdependencies with their organization's critical services and follow their patch management process accordingly.
The vendor recommends upgrading to BIND version 9.8.5-P2, 9.9.3-P2 or 9.9.3-S1-P1(Subscription).
Note to Readers
In support of Public Safety's mission to build a safe and resilient Canada, CCIRC's mandate is to help ensure the security and resilience of the vital non-federal government cyber systems that underpin Canada's national security, public safety and economic prosperity. As Canada's computer security incident response team, CCIRC is Canada's national coordination centre for the prevention and mitigation of, preparedness for, response to, and recovery from cyber incidents on non-federal government systems. It does this by providing authoritative advice and support, and coordinating information sharing and incident response.
Please note, CCIRC PGP key has recently been updated.
For general information, please contact Public Safety Canada's Public Affairs division at:
Telephone: 613-944-4875 or 1-800-830-3118
- Date modified: