"value":"ISC would like to thank SWITCH for informing us of this vulnerability."
}
],
"data_format":"MITRE",
"data_type":"CVE",
"data_version":"4.0",
"description":{
"description_data":[
{
"lang":"eng",
"value":"An error in zone database reference counting can lead to an assertion failure if a server which is running an affected version of BIND attempts several transfers of a slave zone in quick succession. This defect could be deliberately exercised by an attacker who is permitted to cause a vulnerable server to initiate zone transfers (for example: by sending valid NOTIFY messages), causing the named process to exit after failing the assertion test. Affects BIND 9.12.0 and 9.12.1."
"value":"Authoritative servers that serve slave zones are vulnerable to potential denial of service if all of the following are true:\n\n they are running an affected version of BIND (BIND 9.12.0 or 9.12.1)\n at least one of the zones for which they are providing service is of type \"slave\"\n they permit NOTIFY messages from any source."
"value":"The reference counting error which can be exploited in this vulnerability is present in only two public release versions of BIND, 9.12.0 and 9.12.1.\n\nIf you are running an affected version then upgrade to BIND 9.12.1-P1"
}
],
"source":{
"discovery":"UNKNOWN"
},
"work_around":[
{
"lang":"eng",
"value":"For servers which must receive notifies to keep slave zone contents current, no complete workarounds are known although restricting BIND to only accept NOTIFY messages from authorized sources can greatly mitigate the risk of attack."