nomisec
WORKING POC
65 stars
by robertdavidgraham · dos
https://github.com/robertdavidgraham/cve-2015-5477
This is a functional proof-of-concept exploit for CVE-2015-5477, a denial-of-service vulnerability in BIND9. It sends a malformed TKEY packet to trigger an assertion failure, crashing the server.
Classification
Working Poc 100%
Target:
BIND9 (versions prior to the patch for CVE-2015-5477)
No auth needed
Prerequisites:
Network access to the target BIND9 server
nomisec
WORKING POC
14 stars
by elceef · poc
https://github.com/elceef/tkeypoc
This PoC exploits CVE-2015-5477, a DoS vulnerability in BIND9 DNS servers by sending a malformed TKEY query via UDP. The payload triggers a crash in vulnerable BIND9 versions.
Classification
Working Poc 95%
Target:
BIND9 (versions affected by CVE-2015-5477)
No auth needed
Prerequisites:
Network access to target DNS server (UDP port 53)
nomisec
WORKING POC
1 stars
by hmlio · poc
https://github.com/hmlio/vaas-cve-2015-5477
This repository provides a Docker container running a vulnerable version of BIND9 (Debian Wheezy) to demonstrate CVE-2015-5477, a TKEY query denial-of-service vulnerability. The PoC includes instructions to trigger the crash using an external exploit script.
Classification
Working Poc 90%
Target:
BIND9 (Debian Wheezy)
No auth needed
Prerequisites:
Docker environment · Network access to the vulnerable BIND9 instance
nomisec
WORKING POC
1 stars
by knqyf263 · dos
https://github.com/knqyf263/cve-2015-5477
This PoC exploits CVE-2015-5477, a DoS vulnerability in BIND9 caused by a TKEY query assertion failure. The script sends a malformed DNS query with a TKEY record, triggering a crash in vulnerable BIND9 instances.
Classification
Working Poc 90%
Target:
BIND9 (versions affected by CVE-2015-5477)
No auth needed
Prerequisites:
Network access to the target BIND9 server · BIND9 instance vulnerable to CVE-2015-5477
nomisec
WORKING POC
1 stars
by ilanyu · poc
https://github.com/ilanyu/cve-2015-5477
This PoC exploits CVE-2015-5477, a DNS vulnerability in BIND, by sending malformed TKEY and version packets to trigger a denial-of-service (DoS) condition. The script uses TCP to send crafted packets and checks for responses.
Classification
Working Poc 90%
Target:
BIND (versions affected by CVE-2015-5477)
No auth needed
Prerequisites:
Network access to the target DNS server · Target DNS server running vulnerable BIND version
nomisec
STUB
by likekabin · poc
https://github.com/likekabin/ShareDoc_cve-2015-5477
The repository contains only a README.md file with minimal content, mentioning CVE-2015-5477 but providing no exploit code or technical details. It appears to be a placeholder or stub.
Target:
unknown
No auth needed
nomisec
WORKING POC
by xycloops123 · remote
https://github.com/xycloops123/TKEY-remote-DoS-vulnerability-exploit
This PoC exploits CVE-2015-5477, a DoS vulnerability in BIND9's TKEY query handling. It sends a malformed DNS packet to trigger a crash in vulnerable BIND9 servers.
Classification
Working Poc 95%
Target:
BIND9 (versions affected by CVE-2015-5477)
No auth needed
Prerequisites:
Network access to the target's DNS port (53/UDP)
exploitdb
WORKING POC
VERIFIED
by Errata Security · cdosmultiple
https://www.exploit-db.com/exploits/37721
This PoC exploits CVE-2015-5477, a DoS vulnerability in BIND9's TKEY handling. It sends a malformed TKEY packet to crash the server by triggering an assertion failure during record lookup.
Classification
Working Poc 95%
Target:
BIND9 (versions prior to patched releases)
No auth needed
Prerequisites:
Network access to vulnerable BIND9 server
vulncheck_xdb
WORKING POC
dos
https://gitlab.com/LinuxGun/cve-2015-5477
This repository contains a functional PoC exploit for CVE-2015-5477, a DoS vulnerability in BIND9 caused by a NULL pointer dereference in TKEY record processing. The exploit sends a crafted packet to trigger the crash and includes detailed technical analysis in the comments.
Classification
Working Poc 95%
Target:
BIND9 (versions prior to the patch)
No auth needed
Prerequisites:
Network access to the target BIND9 server
metasploit
WORKING POC
by Jonathan Foote, throwawayokejxqbbif, wvu · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/dos/dns/bind_tkey.rb
This Metasploit module exploits CVE-2015-5477, a DoS vulnerability in BIND9 DNS servers by sending a malformed TKEY query, causing the server to crash with a REQUIRE assertion failure.
Classification
Working Poc 95%
Target:
BIND 9.1.0 through 9.8.x, 9.9.0 through 9.9.7-P1, 9.10.0 through 9.10.2-P2
No auth needed
Prerequisites:
Network access to the target DNS server
exploitdb
WORKING POC
by elceef · pythondosmultiple
https://www.exploit-db.com/exploits/37723
This PoC exploits CVE-2015-5477, a DoS vulnerability in BIND9's TKEY query handling. It sends a malformed DNS packet to trigger a crash in vulnerable BIND9 servers.
Classification
Working Poc 90%
Target:
ISC BIND 9
No auth needed
Prerequisites:
Network access to the target's DNS port (53/UDP)