"deny-answer-aliases" is a little-used feature intended to help recursive server operators protect end users against DNS rebinding attacks, a potential method of circumventing the security model used by client browsers. However, a defect in this feature makes it easy, when the feature is in use, to experience an assertion failure in name.c. Affects BIND 9.7.0->9.8.8, 9.9.0->9.9.13, 9.10.0->9.10.8, 9.11.0->9.11.4, 9.12.0->9.12.2, 9.13.0->9.13.2.
Advisories
Source ID Title
Debian DLA Debian DLA DLA-1485-1 bind9 security update
Debian DLA Debian DLA DLA-2807-1 bind9 security update
Ubuntu USN Ubuntu USN USN-3769-1 Bind vulnerability
Ubuntu USN Ubuntu USN USN-3769-2 Bind vulnerability
Fixes

Solution

Most operators will not need to make any changes unless they are using the "deny-answer-aliases" feature (which is described in the BIND 9 Adminstrator Reference Manual section 6.2.) "deny-answer-aliases" is off by default; only configurations which explicitly enable it can be affected by this defect. If you are using "deny-answer-aliases", upgrade to the patched release most closely related to your current version of BIND. 9.9.13-P1 9.10.8-P1 9.11.4-P1 9.12.2-P1 BIND Supported Preview Edition is a special feature preview branch of BIND provided to eligible ISC support customers. 9.11.3-S3


Workaround

This vulnerability can be avoided by disabling the "deny-answer-aliases" feature if it is in use.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: isc

Published:

Updated: 2024-09-16T17:58:43.029Z

Reserved: 2018-01-17T00:00:00

Link: CVE-2018-5740

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-01-16T20:29:01.017

Modified: 2024-11-21T04:09:17.547

Link: CVE-2018-5740

cve-icon Redhat

Severity : Important

Publid Date: 2018-08-08T21:30:00Z

Links: CVE-2018-5740 - Bugzilla

cve-icon OpenCVE Enrichment

No data.