Description: | Summary: Junos OS is prone to multiple denial of service vulnerabilities in ISC BIND named.
Vulnerability Insight: Multiple vulnerabilities were found in the BIND version used by Junos OS:
- buffer.c in named in ISC BIND does not properly construct responses, which allows remote attackers to cause a denial of service via a crafted query. (CVE-2016-2776)
- named in ISC BIND allows remote attackers to cause a denial of service via a DNAME record in the answer section of a response to a recursive query, related to db.c and resolver.c. (CVE-2016-8864)
- named in ISC BIND allows remote attackers to cause a denial of service via a malformed response to an RTYPE ANY query. (CVE-2016-9131)
- named in ISC BIND allows remote attackers to cause a denial of service via a response containing an inconsistency among the DNSSEC-related RRsets. (CVE-2016-9147)
- named in ISC BIND allows remote attackers to cause a denial of service via a crafted DS resource record in an answer. (CVE-2016-9444)
Vulnerability Impact: An attacker may cause a denial of service condition.
Affected Software/OS: Junos OS 12.1X46, 12.3X48 and 15.1X49.
Solution: New builds of Junos OS software are available from Juniper. As a workaround disable the DNS proxy service.
CVSS Score: 7.8
CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C
|