ISC BIND is prone to a remote denial-of-service vulnerability.
Attackers can exploit this issue to crash the affected application, denying service to legitimate users.
Information
Ubuntu Ubuntu Linux 14.04 LTS
Ubuntu Ubuntu Linux 12.04 LTS i386
Ubuntu Ubuntu Linux 12.04 LTS amd64
SuSE openSUSE Evergreen 11.4
Slackware Slackware Linux 14.1
Slackware Slackware Linux 14.0
Slackware Slackware Linux 13.37
Slackware Slackware Linux 13.1
Slackware Slackware Linux 13.0
Redhat Enterprise Linux Workstation 7
Redhat Enterprise Linux Workstation 6
Redhat Enterprise Linux Server EUS 6.6.z
Redhat Enterprise Linux Server 7
Redhat Enterprise Linux Server 6
Redhat Enterprise Linux HPC Node 7
Redhat Enterprise Linux HPC Node 6
Redhat Enterprise Linux Desktop 7
Redhat Enterprise Linux Desktop 6
Oracle Enterprise Linux 6.2
Oracle Enterprise Linux 6
Mandriva Business Server 1 X86 64
Mandriva Business Server 1
Juniper NorthStar Controller Application 2.1.0
ISC BIND 9.7.1-P2
ISC BIND 9.7.1 P1
ISC BIND 9.7.1
ISC BIND 9.7.0 P2
ISC BIND 9.7.0
IBM PowerKVM 2.1
IBM i 7.2
HP HP-UX B.11.31
Gentoo Linux
FreeBSD Freebsd 9.3-RELEASE-p9
FreeBSD FreeBSD 9.3-RELEASE-p6
FreeBSD FreeBSD 9.3-RELEASE-p5
FreeBSD FreeBSD 9.3-RELEASE-p3
FreeBSD FreeBSD 9.3-RELEASE-p2
FreeBSD FreeBSD 9.3-RELEASE-p1
FreeBSD FreeBSD 9.3-RC3-p1
FreeBSD FreeBSD 9.3-RC2-p1
FreeBSD FreeBSD 9.3-RC2
FreeBSD FreeBSD 9.3-RC1-p2
FreeBSD FreeBSD 9.3-RC
FreeBSD FreeBSD 9.3-PRERELEASE
FreeBSD FreeBSD 9.3-BETA3-p2
FreeBSD FreeBSD 9.3-BETA1-p2
FreeBSD FreeBSD 9.3-BETA1-p1
FreeBSD FreeBSD 9.3-BETA1
FreeBSD FreeBSD 9.3
FreeBSD FreeBSD 9.2-STABLE
FreeBSD FreeBSD 9.2-RELENG
FreeBSD FreeBSD 9.2-RELEASE-p9
FreeBSD FreeBSD 9.2-RELEASE-p8
FreeBSD FreeBSD 9.2-RELEASE-p7
FreeBSD FreeBSD 9.2-RELEASE-p5
FreeBSD FreeBSD 9.2-RELEASE-p4
FreeBSD FreeBSD 9.2-RELEASE-p3
FreeBSD FreeBSD 9.2-RELEASE-p16
FreeBSD FreeBSD 9.2-RELEASE-p15
FreeBSD FreeBSD 9.2-RELEASE-p13
FreeBSD FreeBSD 9.2-RELEASE-p12
FreeBSD FreeBSD 9.2-RELEASE-p11
FreeBSD FreeBSD 9.2-RELEASE-p10
FreeBSD FreeBSD 9.2-RC3-p1
FreeBSD FreeBSD 9.2-RC2-p2
FreeBSD FreeBSD 9.2-RC2
FreeBSD FreeBSD 9.2-RC1-p2
FreeBSD FreeBSD 9.2-RC1
FreeBSD FreeBSD 9.2 Rc2
FreeBSD FreeBSD 9.2 Rc1
FreeBSD FreeBSD 9.2 Prerelease
FreeBSD FreeBSD 9.2
FreeBSD FreeBSD 9.1-STABLE
FreeBSD FreeBSD 9.1-RELENG
FreeBSD FreeBSD 9.1-RELEASE-p7
FreeBSD FreeBSD 9.1-RELEASE-p3
FreeBSD FreeBSD 9.1-RELEASE-p23
FreeBSD FreeBSD 9.1-RELEASE-p22
FreeBSD FreeBSD 9.1-RELEASE-p20
FreeBSD FreeBSD 9.1-RELEASE-p19
FreeBSD FreeBSD 9.1-RELEASE-p18
FreeBSD FreeBSD 9.1-RELEASE-p17
FreeBSD FreeBSD 9.1-RELEASE-p16
FreeBSD FreeBSD 9.1-RELEASE-p15
FreeBSD FreeBSD 9.1-RELEASE-p14
FreeBSD FreeBSD 9.1-RELEASE-p12
FreeBSD FreeBSD 9.1-RELEASE-p11
FreeBSD FreeBSD 9.1-RELEASE-p10
FreeBSD FreeBSD 9.1-RELEASE-p1
FreeBSD FreeBSD 9.1-RC2
FreeBSD FreeBSD 9.1-RC1
FreeBSD FreeBSD 9.1--RELENG
FreeBSD FreeBSD 9.1 Release-P5
FreeBSD FreeBSD 9.1 Release-P4
FreeBSD FreeBSD 9.1
FreeBSD FreeBSD 9.0-STABLE
FreeBSD FreeBSD 9.0-RELENG
FreeBSD FreeBSD 9.0-RELEASE-p6
FreeBSD FreeBSD 9.0-RELEASE
FreeBSD FreeBSD 9.0-RC3
FreeBSD FreeBSD 9.0-RC1
FreeBSD FreeBSD 9.0--RELENG
FreeBSD FreeBSD 9.0
FreeBSD FreeBSD 8.4-RELENG
FreeBSD FreeBSD 8.4-RELEASE-p9
FreeBSD FreeBSD 8.4-RELEASE-p8
FreeBSD FreeBSD 8.4-RELEASE-p7
FreeBSD FreeBSD 8.4-RELEASE-p4
FreeBSD Freebsd 8.4-RELEASE-p23
FreeBSD FreeBSD 8.4-RELEASE-p20
FreeBSD FreeBSD 8.4-RELEASE-p19
FreeBSD FreeBSD 8.4-RELEASE-p17
FreeBSD FreeBSD 8.4-RELEASE-p16
FreeBSD FreeBSD 8.4-RELEASE-p15
FreeBSD FreeBSD 8.4-RELEASE-p14
FreeBSD FreeBSD 8.4-RELEASE-p13
FreeBSD FreeBSD 8.4-RELEASE-p12
FreeBSD FreeBSD 8.4-RELEASE-p11
FreeBSD FreeBSD 8.4-RC2-p1
FreeBSD FreeBSD 8.4-RC1-p1
FreeBSD FreeBSD 8.4-PRERELEASE
FreeBSD FreeBSD 8.4-BETA1
FreeBSD FreeBSD 8.4
FreeBSD FreeBSD 8.3-STABLE
FreeBSD FreeBSD 8.3-RELENG
FreeBSD FreeBSD 8.3-RELEASE-p8
FreeBSD FreeBSD 8.3-RELEASE-p6
FreeBSD FreeBSD 8.3-RELEASE-p16
FreeBSD FreeBSD 8.3-RELEASE-p15
FreeBSD FreeBSD 8.3-RELEASE-p14
FreeBSD FreeBSD 8.3-RELEASE-p11
FreeBSD FreeBSD 8.3
FreeBSD FreeBSD 8.2-STABLE
FreeBSD FreeBSD 8.2-RELEASE-p2
FreeBSD FreeBSD 8.2-RELEASE-p1
FreeBSD FreeBSD 8.2-RELEASE
FreeBSD FreeBSD 8.2 - RELEASE -p3
FreeBSD FreeBSD 8.2
FreeBSD FreeBSD 8.1-STABLE
FreeBSD FreeBSD 8.1-RELENG
FreeBSD FreeBSD 8.1-RELEASE-p5
FreeBSD FreeBSD 8.1-RELEASE-p4
FreeBSD FreeBSD 8.1-RELEASE-p1
FreeBSD FreeBSD 8.1-RELEASE
FreeBSD FreeBSD 8.1-PRERELEASE
FreeBSD FreeBSD 8.1
FreeBSD FreeBSD 8.0-STABLE
FreeBSD FreeBSD 8.0-RELEASE
FreeBSD FreeBSD 8.0-RC1
FreeBSD FreeBSD 8.0 -RELEASE-p5
FreeBSD FreeBSD 8.0
Debian Linux 6.0 sparc
Debian Linux 6.0 s/390
Debian Linux 6.0 powerpc
Debian Linux 6.0 mips
Debian Linux 6.0 ia-64
Debian Linux 6.0 ia-32
Debian Linux 6.0 arm
Debian Linux 6.0 amd64
CentOS CentOS 6
Avaya Session Border Controller for Enterprise 6.3.0
Avaya one-X Client Enablement Services 6.0
Avaya IP Office Server Edition 9.0
Avaya IP Office Server Edition 8.1
Avaya IP Office Server Edition 8.0
Avaya IP Office Application Server 9.0
Avaya IP Office Application Server 8.0
Avaya CMS 17.0
Avaya Aura Session Manager 6.0
Avaya Aura Experience Portal 7.0
Avaya Aura Experience Portal 6.0
Avaya Aura Conferencing 8.0
Avaya Aura Conferencing 7.0
Avaya Aura Collaboration Environment 3.0
Avaya Aura Collaboration Environment 2.0
Apple Mac OS X Server 4.1.5
Apple Mac OS X Server 3.2.2
Apple Mac OS X Server 3.2.1
Apple Mac OS X Server 3.1.2
Apple Mac OS X Server 4.1
Apple Mac OS X Server 4.0
Apple Mac OS X Server 3.2
Apple Mac OS X Server 3.0
Apple Mac Os X 10.10.5
FreeBSD FreeBSD 9.3-STABLE
FreeBSD Freebsd 9.3-RELEASE-p10
FreeBSD FreeBSD 8.4-STABLE
FreeBSD Freebsd 8.4-RELEASE-p24
Apple Mac OS X Server 5.0.3
Exploit
Attackers will likely use standard tools to exploit this issue.
References:
- FreeBSD Security Advisory FreeBSD-SA-15:05.bind (FreeBSD)
- CVE-2015-1349: A Problem with Trust Anchor Management Can Cause named to Crash (ISC)
- ISC BIND Homepage (ISC)
- [security bulletin] HPSBUX03379 SSRT101976 rev.1 - HP-UX Running BIND, Remote De (HP)
- 2107-04 Security Bulletin: Multiple Vulnerabilities in NorthStar Controller Appl (juniper)
- ASA-2015-142 (Avaya)
- RHSA-2015:0672-1: bind security update (Red Hat)
- Security Bulletin: IBM i is affected by the following networking BIND vulnerabil (IBM)
- Security Bulletin: PowerKVM is affected by a bind vulnerability (CVE-2015-1349) (IBM)
- SSA:2015-111-01 (Seclists.org)