|Check Point Reference:||CPAI-2013-1269|
|Date Published:||12 Feb 2012|
|Last Updated:||19 Oct 2016|
|Protection Provided by:||
|Who is Vulnerable?|
|Vulnerability Description||A denial of service vulnerability has been reported in ISC BIND. The vulnerability is due to improper handling of zero-length RDATA in certain record types. A remote attacker can exploit this issue by loading a specially crafted file to the DNS server. Successful exploitation would cause the server to crash, resulting in a denial of service condition.|
This protection will detect and block attempts to crash the target server.
In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.
This protection's log will contain the following information:
Attack Name: DNS Enforcement Violation.
Attack Information: ISC BIND Zero Length RDATA Denial of Service - Ver2