4 Ağustos 2015 Salı

CVE-2015-5477 IPS Signature



An error in the handling of TKEY queries can be exploited by an attacker for use as a denial-of-service vector, as a constructed packet can use the defect to trigger a REQUIRE assertion failure, causing BIND to exit.
  
IPS Signature
 

alert udp any any -> any 53 (msg:"ET EXPLOIT Possible BIND9 DoS? CVE-2015-5477 M2"; content:"|01 00 00 01|"; depth:4; offset:2; content:"|00 01|"; distance:4; within:2; pcre:"/^[^\x00]+\x00/R"; content:"|00 f9|"; within:2; fast_pattern; pcre:"/^..[^\x00]+\x00/Rs"; content:!"|00 f9|"; within:2; threshold: type limit, track by_src, seconds 60, count 1; classtype:attempted-dos; sid:2021573; rev:4;)

Solution


Upgrade to the patched release most closely related to your current version of BIND. These can be downloaded from http://www.isc.org/downloads.
  • BIND 9 version 9.9.7-P2
  • BIND 9 version 9.10.2-P3

Hiç yorum yok:

Yorum Gönder