Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2015-5477 β€” AI Deep Analysis Summary

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: A critical DoS flaw in ISC BIND's TKEY query handling. πŸ’₯ **Consequence**: Triggers a `REQUIRE` assertion failure, causing the `named` daemon to crash and exit. Service goes DOWN instantly. πŸ“‰

Q2Root Cause? (CWE/Flaw)

πŸ›‘ **Root Cause**: Improper input validation in TKEY query processing.…

Q3Who is affected? (Versions/Components)

🎯 **Affected**: ISC BIND versions **9.9.7-P1** and earlier. Also **9.10.2-P2** and earlier. πŸ“¦ **Component**: The `named` daemon process.

Q4What can hackers do? (Privileges/Data)

🚫 **Action**: Remote attackers can cause **Denial of Service**. πŸ“‚ **Data**: No data theft or RCE mentioned. Only service disruption via crash. πŸ”’ **Privileges**: No privilege escalation, just service stop.

Q5Is exploitation threshold high? (Auth/Config)

⚑ **Threshold**: LOW. 🌐 **Auth**: None required. Remote, unauthenticated attackers can trigger this via UDP. βš™οΈ **Config**: Standard DNS port 53 exposure is enough.

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ”“ **Public Exp**: YES. Multiple PoCs available on GitHub (e.g., `tkill.c`, `tkeypoc.py`). 🌍 **Wild Exploitation**: Easy to reproduce; simple UDP packet sends can crash the server.…

Q7How to self-check? (Features/Scanning)

πŸ” **Check**: Send a crafted TKEY query. πŸ’₯ **Result**: If `named` crashes/asserts, you are vulnerable. πŸ“‘ **Scan**: Use the provided PoC scripts (`tkill.py`) against target IPs to test for instability.

Q8Is it fixed officially? (Patch/Mitigation)

🩹 **Fix**: YES. Vendor advisories (ISC, Red Hat, SUSE) confirm patches exist. πŸ“… **Date**: Advisories published around July 2015. Update BIND to versions newer than 9.9.7-P1 and 9.10.2-P2.

Q9What if no patch? (Workaround)

πŸ›‘οΈ **Workaround**: If patching is delayed, restrict access to port 53 via firewall. 🚧 **Mitigation**: Block untrusted sources from sending TKEY queries. Consider disabling TKEY if not strictly needed.

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: HIGH. 🚨 **Priority**: Immediate patching required. Since it's a remote, unauthenticated DoS, it can be weaponized for DDoS attacks easily. Don't wait!