ISC BIND CVE-2015-1349 Remote Denial of Service Vulnerability



ISC BIND is prone to a remote denial-of-service vulnerability.

Attackers can exploit this issue to crash the affected application, denying service to legitimate users.

Information

Bugtraq ID: 72673
Class: Failure to Handle Exceptional Conditions
CVE: CVE-2015-1349

Remote: Yes
Local: No
Published: Feb 18 2015 12:00AM
Updated: Apr 13 2017 03:05PM
Credit: Jan-Piet Mens
Vulnerable: Ubuntu Ubuntu Linux 14.10
Ubuntu Ubuntu Linux 14.04 LTS
Ubuntu Ubuntu Linux 12.04 LTS i386
Ubuntu Ubuntu Linux 12.04 LTS amd64
SuSE openSUSE Evergreen 11.4
Slackware Slackware Linux 14.1
Slackware Slackware Linux 14.0
Slackware Slackware Linux 13.37
Slackware Slackware Linux 13.1
Slackware Slackware Linux 13.0
Redhat Enterprise Linux Workstation 7
Redhat Enterprise Linux Workstation 6
Redhat Enterprise Linux Server EUS 6.6.z
Redhat Enterprise Linux Server 7
Redhat Enterprise Linux Server 6
Redhat Enterprise Linux HPC Node 7
Redhat Enterprise Linux HPC Node 6
Redhat Enterprise Linux Desktop 7
Redhat Enterprise Linux Desktop 6
Oracle Enterprise Linux 6.2
Oracle Enterprise Linux 6
Mandriva Business Server 1 X86 64
Mandriva Business Server 1
Juniper NorthStar Controller Application 2.1.0
ISC BIND 9.7.1-P2
ISC BIND 9.7.1 P1
ISC BIND 9.7.1
ISC BIND 9.7.0 P2
ISC BIND 9.7.0
IBM PowerKVM 2.1
IBM i 7.2
HP HP-UX B.11.31
Gentoo Linux
FreeBSD Freebsd 9.3-RELEASE-p9
FreeBSD FreeBSD 9.3-RELEASE-p6
FreeBSD FreeBSD 9.3-RELEASE-p5
FreeBSD FreeBSD 9.3-RELEASE-p3
FreeBSD FreeBSD 9.3-RELEASE-p2
FreeBSD FreeBSD 9.3-RELEASE-p1
FreeBSD FreeBSD 9.3-RC3-p1
FreeBSD FreeBSD 9.3-RC2-p1
FreeBSD FreeBSD 9.3-RC2
FreeBSD FreeBSD 9.3-RC1-p2
FreeBSD FreeBSD 9.3-RC
FreeBSD FreeBSD 9.3-PRERELEASE
FreeBSD FreeBSD 9.3-BETA3-p2
FreeBSD FreeBSD 9.3-BETA1-p2
FreeBSD FreeBSD 9.3-BETA1-p1
FreeBSD FreeBSD 9.3-BETA1
FreeBSD FreeBSD 9.3
FreeBSD FreeBSD 9.2-STABLE
FreeBSD FreeBSD 9.2-RELENG
FreeBSD FreeBSD 9.2-RELEASE-p9
FreeBSD FreeBSD 9.2-RELEASE-p8
FreeBSD FreeBSD 9.2-RELEASE-p7
FreeBSD FreeBSD 9.2-RELEASE-p5
FreeBSD FreeBSD 9.2-RELEASE-p4
FreeBSD FreeBSD 9.2-RELEASE-p3
FreeBSD FreeBSD 9.2-RELEASE-p16
FreeBSD FreeBSD 9.2-RELEASE-p15
FreeBSD FreeBSD 9.2-RELEASE-p13
FreeBSD FreeBSD 9.2-RELEASE-p12
FreeBSD FreeBSD 9.2-RELEASE-p11
FreeBSD FreeBSD 9.2-RELEASE-p10
FreeBSD FreeBSD 9.2-RC3-p1
FreeBSD FreeBSD 9.2-RC2-p2
FreeBSD FreeBSD 9.2-RC2
FreeBSD FreeBSD 9.2-RC1-p2
FreeBSD FreeBSD 9.2-RC1
FreeBSD FreeBSD 9.2 Rc2
FreeBSD FreeBSD 9.2 Rc1
FreeBSD FreeBSD 9.2 Prerelease
FreeBSD FreeBSD 9.2
FreeBSD FreeBSD 9.1-STABLE
FreeBSD FreeBSD 9.1-RELENG
FreeBSD FreeBSD 9.1-RELEASE-p7
FreeBSD FreeBSD 9.1-RELEASE-p3
FreeBSD FreeBSD 9.1-RELEASE-p23
FreeBSD FreeBSD 9.1-RELEASE-p22
FreeBSD FreeBSD 9.1-RELEASE-p20
FreeBSD FreeBSD 9.1-RELEASE-p19
FreeBSD FreeBSD 9.1-RELEASE-p18
FreeBSD FreeBSD 9.1-RELEASE-p17
FreeBSD FreeBSD 9.1-RELEASE-p16
FreeBSD FreeBSD 9.1-RELEASE-p15
FreeBSD FreeBSD 9.1-RELEASE-p14
FreeBSD FreeBSD 9.1-RELEASE-p12
FreeBSD FreeBSD 9.1-RELEASE-p11
FreeBSD FreeBSD 9.1-RELEASE-p10
FreeBSD FreeBSD 9.1-RELEASE-p1
FreeBSD FreeBSD 9.1-RC2
FreeBSD FreeBSD 9.1-RC1
FreeBSD FreeBSD 9.1--RELENG
FreeBSD FreeBSD 9.1 Release-P5
FreeBSD FreeBSD 9.1 Release-P4
FreeBSD FreeBSD 9.1
FreeBSD FreeBSD 9.0-STABLE
FreeBSD FreeBSD 9.0-RELENG
FreeBSD FreeBSD 9.0-RELEASE-p6
FreeBSD FreeBSD 9.0-RELEASE
FreeBSD FreeBSD 9.0-RC3
FreeBSD FreeBSD 9.0-RC1
FreeBSD FreeBSD 9.0--RELENG
FreeBSD FreeBSD 9.0
FreeBSD FreeBSD 8.4-RELENG
FreeBSD FreeBSD 8.4-RELEASE-p9
FreeBSD FreeBSD 8.4-RELEASE-p8
FreeBSD FreeBSD 8.4-RELEASE-p7
FreeBSD FreeBSD 8.4-RELEASE-p4
FreeBSD Freebsd 8.4-RELEASE-p23
FreeBSD FreeBSD 8.4-RELEASE-p20
FreeBSD FreeBSD 8.4-RELEASE-p19
FreeBSD FreeBSD 8.4-RELEASE-p17
FreeBSD FreeBSD 8.4-RELEASE-p16
FreeBSD FreeBSD 8.4-RELEASE-p15
FreeBSD FreeBSD 8.4-RELEASE-p14
FreeBSD FreeBSD 8.4-RELEASE-p13
FreeBSD FreeBSD 8.4-RELEASE-p12
FreeBSD FreeBSD 8.4-RELEASE-p11
FreeBSD FreeBSD 8.4-RC2-p1
FreeBSD FreeBSD 8.4-RC1-p1
FreeBSD FreeBSD 8.4-PRERELEASE
FreeBSD FreeBSD 8.4-BETA1
FreeBSD FreeBSD 8.4
FreeBSD FreeBSD 8.3-STABLE
FreeBSD FreeBSD 8.3-RELENG
FreeBSD FreeBSD 8.3-RELEASE-p8
FreeBSD FreeBSD 8.3-RELEASE-p6
FreeBSD FreeBSD 8.3-RELEASE-p16
FreeBSD FreeBSD 8.3-RELEASE-p15
FreeBSD FreeBSD 8.3-RELEASE-p14
FreeBSD FreeBSD 8.3-RELEASE-p11
FreeBSD FreeBSD 8.3
FreeBSD FreeBSD 8.2-STABLE
FreeBSD FreeBSD 8.2-RELEASE-p2
FreeBSD FreeBSD 8.2-RELEASE-p1
FreeBSD FreeBSD 8.2-RELEASE
FreeBSD FreeBSD 8.2 - RELEASE -p3
FreeBSD FreeBSD 8.2
FreeBSD FreeBSD 8.1-STABLE
FreeBSD FreeBSD 8.1-RELENG
FreeBSD FreeBSD 8.1-RELEASE-p5
FreeBSD FreeBSD 8.1-RELEASE-p4
FreeBSD FreeBSD 8.1-RELEASE-p1
FreeBSD FreeBSD 8.1-RELEASE
FreeBSD FreeBSD 8.1-PRERELEASE
FreeBSD FreeBSD 8.1
FreeBSD FreeBSD 8.0-STABLE
FreeBSD FreeBSD 8.0-RELEASE
FreeBSD FreeBSD 8.0-RC1
FreeBSD FreeBSD 8.0 -RELEASE-p5
FreeBSD FreeBSD 8.0
Debian Linux 6.0 sparc
Debian Linux 6.0 s/390
Debian Linux 6.0 powerpc
Debian Linux 6.0 mips
Debian Linux 6.0 ia-64
Debian Linux 6.0 ia-32
Debian Linux 6.0 arm
Debian Linux 6.0 amd64
CentOS CentOS 6
Avaya Session Border Controller for Enterprise 6.3.0
Avaya one-X Client Enablement Services 6.0
Avaya IP Office Server Edition 9.0
Avaya IP Office Server Edition 8.1
Avaya IP Office Server Edition 8.0
Avaya IP Office Application Server 9.0
Avaya IP Office Application Server 8.0
Avaya CMS 17.0
Avaya Aura Session Manager 6.0
Avaya Aura Experience Portal 7.0
Avaya Aura Experience Portal 6.0
Avaya Aura Conferencing 8.0
Avaya Aura Conferencing 7.0
Avaya Aura Collaboration Environment 3.0
Avaya Aura Collaboration Environment 2.0
Apple Mac OS X Server 4.1.5
Apple Mac OS X Server 3.2.2
Apple Mac OS X Server 3.2.1
Apple Mac OS X Server 3.1.2
Apple Mac OS X Server 4.1
Apple Mac OS X Server 4.0
Apple Mac OS X Server 3.2
Apple Mac OS X Server 3.0
Apple Mac Os X 10.10.5


Not Vulnerable: Juniper NorthStar Controller Application 2.1.0 Service Pack 1
FreeBSD FreeBSD 9.3-STABLE
FreeBSD Freebsd 9.3-RELEASE-p10
FreeBSD FreeBSD 8.4-STABLE
FreeBSD Freebsd 8.4-RELEASE-p24
Apple Mac OS X Server 5.0.3


Exploit


Attackers will likely use standard tools to exploit this issue.


Related Posts

Comments