BIND DNS V9 DNS64 and RPZ DoS Vulnerability
This content has been archived
This article no longer conforms to NHS Digital's standards for cyber alerts, and may contain outdated or inaccurate information. Use of this information contained in this page is at your own risk
Summary
Affected platforms
The following platforms are known to be affected:
Threat details
Only servers which are configured to simultaneously use both Response Policy Zones (RPZ) and DNS64 can be affected by this vulnerability.
DNS64 is often used where an IPv6 only client needs to receive an IPv6 address via an IPv4 proxy address.
The RPZ is used by recursive resolvers to allow for the customised handling of the resolution of collections of domain name information. When this condition occurs, it will result in either an INSIST assertion failure (and subsequent abort) or an attempt to read through a NULL pointer. On most platforms, a NULL pointer read leads to a segmentation fault which causes the process to be terminated. In both cases the failures will usually lead to a denial of service event.
Remediation steps
Last edited: 17 February 2020 11:27 am