Vulnerability Name:

CVE-2005-0034 (CCN-19062)

Assigned:2005-01-25
Published:2005-01-25
Updated:2017-07-11
Summary:An "incorrect assumption" in the authvalidated validator function in BIND 9.3.0, when DNSSEC is enabled, allows remote attackers to cause a denial of service (named server exit) via crafted DNS packets that cause an internal consistency test (self-check) to fail.
CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Low
CVSS v2 Severity:4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
Vulnerability Type:CWE-Other
Vulnerability Consequences:Denial of Service
References:Source: CCN
Type: FreeBSD Security Advisory FreeBSD-SA-05:12.bind9
BIND 9 DNSSEC remote denial of service vulnerability

Source: MITRE
Type: CNA
CVE-2005-0034

Source: CCN
Type: SA14008
BIND Validator Denial of Service Vulnerability

Source: SECUNIA
Type: UNKNOWN
14008

Source: CCN
Type: SECTRACK ID: 1012995
BIND 9 Validator Assumption Error May Let Remote Users Deny Service

Source: SECTRACK
Type: UNKNOWN
1012995

Source: CCN
Type: CIAC INFORMATION BULLETIN P-114
BIND: Self Check Failing

Source: CONFIRM
Type: Patch
http://www.isc.org/index.pl?/sw/bind/bind-security.php

Source: CONFIRM
Type: UNKNOWN
http://www.isc.org/index.pl?/sw/bind/bind9.php

Source: CCN
Type: Internet Software Consortium (ISC) Web site
BIND (Berkeley Internet Name Domain) page

Source: CCN
Type: US-CERT VU#938617
BIND 9.3.0 vulnerable to denial of service in validator code

Source: CERT-VN
Type: Patch, US Government Resource
VU#938617

Source: CCN
Type: OSVDB ID: 13175
ISC BIND dnssec authvalidated Crafted Packet Remote DoS

Source: BID
Type: UNKNOWN
12365

Source: CCN
Type: BID-12365
BIND Validator Self Checking Remote Denial Of Service Vulnerability

Source: TRUSTIX
Type: UNKNOWN
2005-0003

Source: MISC
Type: Patch
http://www.uniras.gov.uk/niscc/docs/al-20050125-00060.html

Source: CCN
Type: NISCC Vulnerability Advisory 731920
Vulnerability Issues with the BIND 9 Software

Source: XF
Type: UNKNOWN
bind-named-dns-dos(19062)

Source: XF
Type: UNKNOWN
bind-named-dns-dos(19062)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:isc:bind:9.3.0:*:*:*:-:*:*:*

  • Configuration CCN 1:
  • cpe:/a:isc:bind:9.3.0:*:*:*:-:*:*:*
  • AND
  • cpe:/o:redhat:linux:*:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:10.1::x86-64:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    isc bind 9.3.0
    isc bind 9.3.0
    redhat linux *
    mandrakesoft mandrake linux 10.1
    mandrakesoft mandrake linux 10.1