发布时间 :2000-12-19 00:00:00
修订时间 :2008-09-05 16:22:07

[原文]named in BIND 8.2 through 8.2.2-P6 allows remote attackers to cause a denial of service by making a compressed zone transfer (ZXFR) request and performing a name service query on an authoritative record that is not cached, aka the "zxfr bug."

[CNNVD]BIND named漏洞(CNNVD-200012-149)

        BIND 8.2到8.2.2-P6版本中named存在漏洞。远程攻击者通过制作压缩区域传输(ZXFR)请求并执行一项非缓存的权威性记录名称服务查询,又称为"zxfr bug."。

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)


- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(UNKNOWN)  CERT  CA-2000-20
(UNKNOWN)  XF  bind-zxfr-dos(5540)
(UNKNOWN)  BUGTRAQ  20001107 BIND 8.2.2-P5 Possible DOS
(UNKNOWN)  DEBIAN  20001112 bind: remote Denial of Service
(UNKNOWN)  SUSE  SuSE-SA:2000:45
(UNKNOWN)  BUGTRAQ  20001115 Trustix Security Advisory - bind and openssh (and modutils)

- 漏洞信息

BIND named漏洞
中危 未知
2000-12-19 00:00:00 2005-10-12 00:00:00
        BIND 8.2到8.2.2-P6版本中named存在漏洞。远程攻击者通过制作压缩区域传输(ZXFR)请求并执行一项非缓存的权威性记录名称服务查询,又称为"zxfr bug."。

- 公告与补丁


- 漏洞信息 (20388)

BIND 8.2.2-P5 Denial of Service Vulnerability (EDBID:20388)
linux dos
2000-11-01 Verified
0 Fabio Pietrosanti
N/A [点击下载]

BIND is the Berkeley Internet Name Daemon, a free Name Resolution software package maintained by the Internet Software Consortium. A Denial of Service exists in current implementations.

The problem occurs in the Compressed Zone Transfer (ZXFR) functionality of BIND. A default installation of BIND does not support the transfer of compressed zone files. However, daemon that allows zone transfers and recursive queries will crash if queried for a compressed zone transfer that is not in the nameserver cache. This could result in a name resolution Denial of Service for all users and systems depending upon nameservers using the affected software.

named-xfer -z -d 9 -f pics -Z		

- 漏洞信息

ISC BIND Compressed ZXFR Name Service Query Remote DoS
Remote / Network Access Denial of Service
Loss of Availability
Exploit Public

- 漏洞描述

This host is running an old version of the BIND name server software. BIND versions between 8.2.2p1 and 8.2.2p6 are vulnerable to a denial of service attack in the zone transfer request parsing code. An attacker can exploit this to remotely disable the DNS service on this machine.

- 时间线

2000-11-07 Unknow
2000-11-07 Unknow

- 解决方案

Ugrade to that latest version of BIND available from

- 相关参考

- 漏洞作者

Unknown or Incomplete