Vigil@nce - BIND: denial of service via DNSSEC Trust Anchor
March 2015 by Vigil@nce
This bulletin was written by Vigil@nce : http://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
An attacker can invite BIND to perform a DNSSEC validation, in
order to trigger a denial of service.
Impacted products: Debian, Fedora, FreeBSD, BIND, MBS, Ubuntu
Severity: 2/4
Creation date: 19/02/2015
DESCRIPTION OF THE VULNERABILITY
The BIND product can be configured to perform DNSSEC validation,
with "dnssec-validation auto;" or "dnssec-lookaside auto;".
However, an assertion error occurs when BIND validates a Trust
Anchor, with:
– a key which was previously trusted but now flagged as revoked
– when there are no other trusted keys available
– when there is a standby key, but it is not trusted yet
An attacker can therefore invite BIND to perform a DNSSEC
validation, in order to trigger a denial of service.
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
http://vigilance.fr/vulnerability/BIND-denial-of-service-via-DNSSEC-Trust-Anchor-16215