// For flags

CVE-2015-5477

ISC BIND 9 - TKEY Remote Denial of Service (PoC)

Severity Score

7.8
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

2
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

named in ISC BIND 9.x before 9.9.7-P2 and 9.10.x before 9.10.2-P3 allows remote attackers to cause a denial of service (REQUIRE assertion failure and daemon exit) via TKEY queries.

Vulnerabilidad identificada en ISC BIND 9.x en versiones anteriores a 9.9.7-P2 y 9.10.x en versiones anteriores a 9.10.2-P3, permite a atacantes remotos causar una denegación de servicio (fallo en la comprobación de REQUIRE y salida del demonio) a través de consultas TKEY.

A flaw was found in the way BIND handled requests for TKEY DNS resource records. A remote attacker could use this flaw to make named (functioning as an authoritative DNS server or a DNS resolver) exit unexpectedly with an assertion failure via a specially crafted DNS request packet.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
None
Availability
Complete
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
None
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2015-07-10 CVE Reserved
  • 2015-07-28 CVE Published
  • 2024-08-06 CVE Updated
  • 2024-08-06 First Exploit
  • 2024-08-22 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-19: Data Processing Errors
  • CWE-617: Reachable Assertion
CAPEC
References (46)
URL Date SRC
https://kb.isc.org/article/AA-01272 2015-07-28
URL Date SRC
http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163006.html 2017-11-10
http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163007.html 2017-11-10
http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163015.html 2017-11-10
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00043.html 2017-11-10
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00044.html 2017-11-10
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00045.html 2017-11-10
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00048.html 2017-11-10
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00050.html 2017-11-10
http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00001.html 2017-11-10
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00033.html 2017-11-10
http://marc.info/?l=bugtraq&m=144000632319155&w=2 2017-11-10
http://marc.info/?l=bugtraq&m=144017354030745&w=2 2017-11-10
http://marc.info/?l=bugtraq&m=144181171013996&w=2 2017-11-10
http://marc.info/?l=bugtraq&m=144294073801304&w=2 2017-11-10
http://rhn.redhat.com/errata/RHSA-2015-1513.html 2017-11-10
http://rhn.redhat.com/errata/RHSA-2015-1514.html 2017-11-10
http://rhn.redhat.com/errata/RHSA-2015-1515.html 2017-11-10
http://rhn.redhat.com/errata/RHSA-2016-0078.html 2017-11-10
http://rhn.redhat.com/errata/RHSA-2016-0079.html 2017-11-10
http://www.debian.org/security/2015/dsa-3319 2017-11-10
http://www.ubuntu.com/usn/USN-2693-1 2017-11-10
https://security.gentoo.org/glsa/201510-01 2017-11-10
https://access.redhat.com/security/cve/CVE-2015-5477 2016-01-28
https://bugzilla.redhat.com/show_bug.cgi?id=1247361 2016-01-28
https://access.redhat.com/solutions/1548963 2016-01-28
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Isc
Search vendor "Isc"
Bind
Search vendor "Isc" for product "Bind"
<= 9.9.7
Search vendor "Isc" for product "Bind" and version " <= 9.9.7"
p1
Affected
Isc
Search vendor "Isc"
Bind
Search vendor "Isc" for product "Bind"
<= 9.10.2
Search vendor "Isc" for product "Bind" and version " <= 9.10.2"
p2
Affected