module

BIND TKEY Query Denial of Service

Disclosed
2015-07-28
Created
2018-05-30

Description

This module sends a malformed TKEY query, which exploits an
error in handling TKEY queries on affected BIND9 'named' DNS servers.
As a result, a vulnerable named server will exit with a REQUIRE
assertion failure. This condition can be exploited in versions of BIND
between BIND 9.1.0 through 9.8.x, 9.9.0 through 9.9.7-P1 and 9.10.0
through 9.10.2-P2.

Authors

Jonathan Foote
throwawayokejxqbbif
wvu wvu@metasploit.com

Module Options

To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:


msf > use auxiliary/dos/dns/bind_tkey
msf auxiliary(bind_tkey) > show actions
...actions...
msf auxiliary(bind_tkey) > set ACTION < action-name >
msf auxiliary(bind_tkey) > show options
...show and set options...
msf auxiliary(bind_tkey) > run

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.