Skip to main content

CVE-1999-0011: Denial of Service vulnerabilities in BIND 4.9 and BIND 8 Releases via CNAME record and zone transfer

Medium
VulnerabilityCVE-1999-0011cve-1999-0011denial of servicecwe-1067
Published: Wed Apr 08 1998 (04/08/1998, 04:00:00 UTC)
Source: NVD
Vendor/Project: data_general
Product: dg_ux

Description

Denial of Service vulnerabilities in BIND 4.9 and BIND 8 Releases via CNAME record and zone transfer.

AI-Powered Analysis

AILast updated: 07/01/2025, 22:26:13 UTC

Technical Analysis

CVE-1999-0011 describes Denial of Service (DoS) vulnerabilities affecting BIND (Berkeley Internet Name Domain) versions 4.9 and 8, as well as several other older versions. BIND is a widely used DNS server software that resolves domain names to IP addresses. The vulnerabilities arise from improper handling of CNAME records and zone transfers, which are fundamental DNS operations. Specifically, crafted CNAME records or malformed zone transfer requests can cause the affected BIND servers to crash or become unresponsive, resulting in denial of service. This vulnerability is categorized under CWE-1067, which relates to improper handling of exceptional conditions leading to resource exhaustion or service disruption. The CVSS v3.1 base score is 5.4 (medium severity), with the vector indicating an attack requiring adjacent network access (AV:A), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), limited confidentiality impact (C:L), no integrity impact (I:N), and limited availability impact (A:L). The vulnerability was published in 1998, and patches are available from SGI's security advisories. No known exploits are reported in the wild currently. The affected versions include multiple legacy BIND releases and various versions of the dg_ux product from Data General, indicating the vulnerability's age and relevance primarily to legacy systems still in operation. The root cause is the inadequate validation and handling of DNS CNAME records and zone transfer requests, which can be exploited by an attacker on the same or adjacent network segment to disrupt DNS services by causing server crashes or hangs.

Potential Impact

For European organizations, the impact of this vulnerability primarily concerns the availability of DNS services. DNS is critical infrastructure for network operations, and disruption can lead to denial of access to internal and external resources, impacting business continuity, communications, and online services. Although the confidentiality and integrity impacts are limited, the availability impact can be significant, especially for organizations relying on legacy BIND versions in critical environments. This includes government agencies, educational institutions, and enterprises that have not migrated from older UNIX-based systems or legacy network infrastructure. DNS service outages can also affect dependent services such as email, web hosting, and internal applications, potentially causing operational disruptions and reputational damage. Given the vulnerability requires no privileges or user interaction but does require adjacent network access, attackers with network proximity (e.g., internal threat actors or compromised devices within the same subnet) could exploit this to cause service outages. While modern deployments have largely moved away from these BIND versions, some legacy systems in European critical infrastructure or industrial control systems might still be vulnerable, posing a risk to availability and operational stability.

Mitigation Recommendations

European organizations should first identify any legacy BIND installations, particularly versions 4.9, 8, and other listed affected versions, as well as dg_ux systems running vulnerable patches. Immediate mitigation involves applying the official patches referenced in the SGI advisories to remediate the vulnerability. If patching is not immediately feasible, organizations should restrict access to DNS servers by implementing network segmentation and firewall rules to limit zone transfer and DNS query traffic to trusted hosts only, especially blocking access from adjacent network segments that are not authorized. Monitoring DNS server logs for unusual CNAME or zone transfer requests can help detect potential exploitation attempts. Additionally, organizations should consider migrating legacy DNS infrastructure to supported, modern BIND versions or alternative DNS software with active security maintenance. Employing DNS rate limiting and anomaly detection can further reduce the risk of DoS attacks. Regular vulnerability scanning and network audits should be conducted to ensure no vulnerable BIND versions remain in production. Finally, documenting and rehearsing incident response plans for DNS outages will help minimize operational impact if exploitation occurs.

Need more detailed analysis?Get Pro

Threat ID: 682ca32bb6fd31d6ed7de95d

Added to database: 5/20/2025, 3:43:39 PM

Last enriched: 7/1/2025, 10:26:13 PM

Last updated: 7/28/2025, 8:55:01 AM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats