The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

vulnerability note CVE-2016-2775

ISC BIND: infinite loop via lwresd

Synthesis of the vulnerability

An attacker can generate an infinite loop via lwresd of ISC BIND, in order to trigger a denial of service.
Vulnerable systems: Debian, VNX Operating Environment, VNX Series, Fedora, HP-UX, AIX, BIND, openSUSE Leap, Solaris, RHEL, Slackware, SUSE Linux Enterprise Desktop, SLES, VxWorks.
Severity of this threat: 2/4.
Consequences of an attack: denial of service on service.
Pirate's origin: internet client.
Creation date: 19/07/2016.
Références of this weakness: AA-01393, bulletinjul2016, c05321107, CVE-2016-2775, DLA-645-1, DSA-2019-131, FEDORA-2016-007efacd1c, FEDORA-2016-2941b3264e, FEDORA-2016-3fba74e7f5, FEDORA-2016-53f0c65f40, openSUSE-SU-2017:1063-1, RHSA-2017:2533-01, SSA:2016-204-01, SUSE-SU-2017:0998-1, SUSE-SU-2017:0999-1, SUSE-SU-2017:1027-1, VIGILANCE-VUL-20144.

Description of the vulnerability

The ISC BIND product implements the "lightweight resolver protocol" in the lwresd daemon, or in named when named.conf contains the "lwres" section.

However, if getrrsetbyname() is called to resolve a long relative name (combined with a search list entry), an infinite recursion occurs in lwresd/lwres.

An attacker can therefore generate an infinite loop via lwresd of ISC BIND, in order to trigger a denial of service.
Full Vigil@nce bulletin... (Free trial)

Computer vulnerabilities tracking service

Vigil@nce provides a networks vulnerabilities note. Each administrator can customize the list of products for which he wants to receive vulnerability alerts. The Vigil@nce vulnerability database contains several thousand vulnerabilities. The Vigil@nce team tracks computer vulnerabilities impacting systems and applications.