Security fixes released for BIND
Date: 3 September 2015
The purpose of this advisory is to bring attention to the recently released security fixes for BIND.
Internet Systems Consortium (ISC) has released security fixes to address two vulnerabilities in BIND. A remote attacker that provides a maliciously constructed response in answer to a query, or by using a query which requires a response from a zone containing a deliberately malformed key can cause validating resolver to exit due to a failed assertion in the first vulnerability in openpgpkey_61.c and in the second vulnerability in buffer.c. Servers which are affected may terminate with an assertion failure, causing denial of service to all clients.
Versions affected: BIND 9.0.0 -> 9.8.8, BIND 9.9.0 -> 9.9.7-P2, BIND 9.10.0 -> 9.10.2-P3
CVE References: CVE-2015-5722, CVE-2015-5986
CCIRC recommends that owner/operators test and deploy the vendor released updates or workarounds to affected platforms accordingly.
CVE-2015-5722: Parsing malformed keys may cause BIND to exit due to a failed assertion in buffer.c
CVE-2015-5986: An incorrect boundary check can trigger a REQUIRE assertion failure in openpgpkey_61.c
Note to Readers
In support of Public Safety's mission to build a safe and resilient Canada, CCIRC's mandate is to help ensure the security and resilience of the vital non-federal government cyber systems that underpin Canada's national security, public safety and economic prosperity. As Canada's computer security incident response team, CCIRC is Canada's national coordination centre for the prevention and mitigation of, preparedness for, response to, and recovery from cyber incidents on non-federal government systems. It does this by providing authoritative advice and support, and coordinating information sharing and incident response.
Please note, CCIRC PGP key has recently been updated.
For general information, please contact Public Safety Canada's Public Affairs division at:
Telephone: 613-944-4875 or 1-800-830-3118
- Date modified: