Rechercher
Contactez-nous Suivez-nous sur Twitter En francais English Language
 











Freely subscribe to our NEWSLETTER

Newsletter FR

Newsletter EN

Vulnérabilités

Unsubscribe

Vigil@nce: BIND, denial of service under Windows

September 2008 by Vigil@nce

SYNTHESIS

An attacker can stop the UDP service on some Windows versions of
BIND.

Gravity: 2/4

Consequences: denial of service of service

Provenance: internet client

Means of attack: no proof of concept, no attack

Ability of attacker: expert (4/4)

Confidence: confirmed by the editor (5/5)

Diffusion of the vulnerable configuration: high (3/3)

Creation date: 19/09/2008

IMPACTED PRODUCTS

 ISC BIND

DESCRIPTION

The 9.3.5-P2-W1, 9.4.2-P2-W1 and 9.5.0-P2-W1 versions of BIND are
specific to Windows.

These versions change the way that UDP sockets are created. The
isc_socket_connect() function of the lib/isc/win32/socket.c file
now calls ConnectEx() instead of connect().

The usage of ConnectEx() requires a previous call to bind() to
bind the socket. However, BIND does not call bind(), which creates
an error when numerous UDP queries are received.

An attacker can thus stop the UDP service of BIND under Windows.
This error also occurs naturally when the service is loaded.

CHARACTERISTICS

Identifiers: BID-31252, CVE-2008-4163, VIGILANCE-VUL-8118

http://vigilance.aql.fr/vulnerability/8118


See previous articles

    

See next articles












Your podcast Here

New, you can have your Podcast here. Contact us for more information ask:
Marc Brami
Phone: +33 1 40 92 05 55
Mail: ipsimp@free.fr

All new podcasts