Vigil@nce: BIND, denial of service under Windows
September 2008 by Vigil@nce
SYNTHESIS
An attacker can stop the UDP service on some Windows versions of
BIND.
Gravity: 2/4
Consequences: denial of service of service
Provenance: internet client
Means of attack: no proof of concept, no attack
Ability of attacker: expert (4/4)
Confidence: confirmed by the editor (5/5)
Diffusion of the vulnerable configuration: high (3/3)
Creation date: 19/09/2008
IMPACTED PRODUCTS
– ISC BIND
DESCRIPTION
The 9.3.5-P2-W1, 9.4.2-P2-W1 and 9.5.0-P2-W1 versions of BIND are
specific to Windows.
These versions change the way that UDP sockets are created. The
isc_socket_connect() function of the lib/isc/win32/socket.c file
now calls ConnectEx() instead of connect().
The usage of ConnectEx() requires a previous call to bind() to
bind the socket. However, BIND does not call bind(), which creates
an error when numerous UDP queries are received.
An attacker can thus stop the UDP service of BIND under Windows.
This error also occurs naturally when the service is loaded.
CHARACTERISTICS
Identifiers: BID-31252, CVE-2008-4163, VIGILANCE-VUL-8118