// For flags

CVE-2015-5477

ISC BIND 9 - TKEY Remote Denial of Service (PoC)

Severity Score

10.0
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

11
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

named in ISC BIND 9.x before 9.9.7-P2 and 9.10.x before 9.10.2-P3 allows remote attackers to cause a denial of service (REQUIRE assertion failure and daemon exit) via TKEY queries.

Vulnerabilidad identificada en ISC BIND 9.x en versiones anteriores a 9.9.7-P2 y 9.10.x en versiones anteriores a 9.10.2-P3, permite a atacantes remotos causar una denegación de servicio (fallo en la comprobación de REQUIRE y salida del demonio) a través de consultas TKEY.

A flaw was found in the way BIND handled requests for TKEY DNS resource records. A remote attacker could use this flaw to make named (functioning as an authoritative DNS server or a DNS resolver) exit unexpectedly with an assertion failure via a specially crafted DNS request packet.

Jonathan Foote discovered that Bind incorrectly handled certain TKEY queries. A remote attacker could use this issue with a specially crafted packet to cause Bind to crash, resulting in a denial of service. Pories Ediansyah discovered that Bind incorrectly handled certain configurations involving DNS64. A remote attacker could use this issue with a specially crafted query to cause Bind to crash, resulting in a denial of service. This issue only affected Ubuntu 12.04 LTS. Various other issues were also addressed.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
None
Availability
Complete
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
None
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2015-07-10 CVE Reserved
  • 2015-07-28 CVE Published
  • 2015-07-31 First Exploit
  • 2024-08-06 CVE Updated
  • 2025-03-18 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-19: Data Processing Errors
  • CWE-617: Reachable Assertion
CAPEC
References (55)
URL Date SRC
https://kb.isc.org/article/AA-01272 2015-07-28
URL Date SRC
http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163006.html 2017-11-10
http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163007.html 2017-11-10
http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163015.html 2017-11-10
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00043.html 2017-11-10
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00044.html 2017-11-10
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00045.html 2017-11-10
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00048.html 2017-11-10
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00050.html 2017-11-10
http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00001.html 2017-11-10
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00033.html 2017-11-10
http://marc.info/?l=bugtraq&m=144000632319155&w=2 2017-11-10
http://marc.info/?l=bugtraq&m=144017354030745&w=2 2017-11-10
http://marc.info/?l=bugtraq&m=144181171013996&w=2 2017-11-10
http://marc.info/?l=bugtraq&m=144294073801304&w=2 2017-11-10
http://rhn.redhat.com/errata/RHSA-2015-1513.html 2017-11-10
http://rhn.redhat.com/errata/RHSA-2015-1514.html 2017-11-10
http://rhn.redhat.com/errata/RHSA-2015-1515.html 2017-11-10
http://rhn.redhat.com/errata/RHSA-2016-0078.html 2017-11-10
http://rhn.redhat.com/errata/RHSA-2016-0079.html 2017-11-10
http://www.debian.org/security/2015/dsa-3319 2017-11-10
http://www.ubuntu.com/usn/USN-2693-1 2017-11-10
https://security.gentoo.org/glsa/201510-01 2017-11-10
https://access.redhat.com/security/cve/CVE-2015-5477 2016-01-28
https://bugzilla.redhat.com/show_bug.cgi?id=1247361 2016-01-28
https://access.redhat.com/solutions/1548963 2016-01-28
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Isc
Search vendor "Isc"
Bind
Search vendor "Isc" for product "Bind"
<= 9.9.7
Search vendor "Isc" for product "Bind" and version " <= 9.9.7"
p1
Affected
Isc
Search vendor "Isc"
Bind
Search vendor "Isc" for product "Bind"
<= 9.10.2
Search vendor "Isc" for product "Bind" and version " <= 9.10.2"
p2
Affected