Sun supported Solaris Operating Environments are not affected by the
latest BIND
vulnerabilities documented by the Internet Systems Consortium.
Solaris 8, 9 and 10 OE’s are unaffected as they provide earlier
versions of BIND which are not vulnerable to these latest vulnerabilities:
- SIG Query Processing (CVE-2006-4095):
Recursive servers:
Queries for SIG records will trigger a assertion failure if more
than one SIG (covered) RRset is returned. Exposure can be
minimised by restricting sources that can ask for recursion.Authoritative servers:
If a nameserver is serving a RFC 2535 DNSSEC zone and is queried for the SIG records where the are multiple SIG(covered) RRsets (e.g. a zone apex) then named will trigger a assertion failure when it tries to construct the response.
- Excessive Recursive Queries INSIST failure (CVE-2006-4096):
It is possible to trigger an INSIST failure by sending enough recursive queries that the response to the query arrives after all the clients looking for the response have left the recursion queue.
Exposure can be minimised by restricting sources that can ask for recursion.
Note for BIND 9.2.x: Code handling this path for 9.2.x has been determined to be wrong, though ISC has not been able to detect an execution path that would trigger the erroneous code in 9.2.x.
Stace
Tag: topic:[BIND]