BIND DNS Software Vulnerability Let Remote Attackers to Cause a Denial-of-service Condition

Internet Systems Consortium (ISC) published security updates for vulnerabilities in BIND DNS software that allows an remote attacker to cause a denial-of-service condition.

BIND stands for “Berkeley Internet Name Domain” is the most popular Domain Name System used to resolve DNS queries for users. It was written by graduate students at the University of California, Berkeley.

BIND DNS Vulnerability

CVE-2018-5743

Following are the version affected 9.9.0 -> 9.10.8-P1, 9.11.0 -> 9.11.6, 9.12.0 -> 9.12.4, 9.14.0, preview editions 9.9.3-S1 -> 9.11.5-S3, and 9.11.5-S5. The versions 9.13.0 -> 9.13.7 of the 9.13 development branch are also affected.

The vulnerability resides in the code which uws intended to limit the number of connections, an error with the code can be exploited to grow the connection beyong limit.

It can be tracked as CVE-2018-5743 and there is no exploits at this time, the vulnerability can be fixed by updating to following versions that includes BIND 9.11.6-P1, BIND 9.12.4-P1, BIND 9.14.1.

CVE-2019-6467

9.12.0-> 9.12.4, 9.14.0 and 9.13 development branch are affected.A programming error in the nxdomain-redirect feature can cause an assertion failure in query.c if the alternate namespace used by nxdomain-redirect is a descendant of a zone that is served locally.

An attacker who can deliberately trigger the condition on a server with a vulnerable configuration can cause BIND to exit, denying service to other clients.

It can be tracked as CVE-2019-6467 and there is no exploits at this time, the vulberability can be fixed by updating to following versions that includes BBIND 9.12.4-P1 and BIND 9.14.1.

CVE-2019-6468

BIND Supported Preview Edition version 9.10.5-S1 -> 9.11.5-S5. ONLY BIND Supported Preview Edition releases are affected.

If nxdomain-redirect is enabled (via configuration) in a vulnerable BIND release, a malicious party can cause BIND to exit by deliberately triggering the bug.

It can be tracked as CVE-2019-6468 and there is no exploits at this time, the vulberability can be fixed by updating to following versions that includes BIND 9.11.5-S6 and BIND 9.11.6-S1.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

Ivanti Fully Patched Connect Secure RCE Vulnerability That Actively Exploited in the Wild

April 5, 2025 – Ivanti has issued an urgent security advisory for CVE-2025-22457, a critical…

12 minutes ago

Beware! Weaponized Job Recruitment Emails Spreading BeaverTail and Tropidoor Malware

A concerning malware campaign was disclosed by the AhnLab Security Intelligence Center (ASEC), revealing how…

4 hours ago

EncryptHub Ransomware Uncovered Through ChatGPT Use and OPSEC Failures

EncryptHub, a rapidly evolving cybercriminal entity, has come under intense scrutiny following revelations of operational…

4 hours ago

PoisonSeed Targets CRM and Bulk Email Providers in New Supply Chain Phishing Attack

A sophisticated phishing campaign, dubbed "PoisonSeed," has been identified targeting customer relationship management (CRM) and…

4 hours ago

Beware! Fake Unpaid Tolls Messages Used in Phishing Attack to Steal Login Credentials

A surge in phishing text messages claiming unpaid tolls has been linked to a massive…

4 hours ago

State Bar of Texas Confirms Data Breach, Begins Notifying Affected Consumers

The State Bar of Texas has confirmed a data breach following the detection of unauthorized…

4 hours ago