Inverse Query Buffer Overflow in BIND 4.9 and BIND 8 Releases

HIGH (10.0) No Patch (10112 days)

Threat Intelligence

⚠️ CRITICAL GAP - Exploits exist but no detection available
EPSS Score: 80.48% chance of exploitation (percentile: 99%)
🔍 Detection Tools: None available in major open-source tools
⚔️ Exploit Availability: Exploit-DB

How we test →

What is it?

BIND is a popular open-source DNS server software used to manage domain name system (DNS) records for Internet Protocol version 4 (IPv4). This vulnerability allows an attacker to overflow the buffer of the inverse query function, potentially leading to arbitrary code execution on the server. If your organization uses a BIND server without proper configuration or security measures, this could lead to unauthorized access and potential data breaches.

Am I affected?

You're affected if you use Inverse query buffer overflow. Specific version info not stated in the advisory. If you don't recognise this software, you're probably not affected.

Affected Products

SGI / BIND

How to fix

  1. Upgrade to a patched version of BIND 9 or later: Download the patch from SGI's patches page and follow the instructions.
  2. If an upgrade is not possible, implement immediate mitigations:
  3. Restrict access to the BIND server using firewall rules or other network security measures.
  4. Monitor DNS query logs for suspicious activity.