Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-2c71-gzfy-2qhr
Vulnerability ID VCID-2c71-gzfy-2qhr
Aliases CVE-2015-5477
Summary A vulnerability in BIND could lead to a Denial of Service condition.
Status Published
Exploitability 2.0
Weighted Severity 3.4
Risk 6.8
Affected and Fixed Packages Package Details
Weaknesses (2)
Data source Exploit-DB
Date added Aug. 5, 2015
Description ISC BIND 9 - TKEY Remote Denial of Service (PoC)
Ransomware campaign use Unknown
Source publication date Aug. 5, 2015
Exploit type dos
Platform multiple
Source update date Jan. 11, 2018
Data source Metasploit
Description This module sends a malformed TKEY query, which exploits an error in handling TKEY queries on affected BIND9 'named' DNS servers. As a result, a vulnerable named server will exit with a REQUIRE assertion failure. This condition can be exploited in versions of BIND between BIND 9.1.0 through 9.8.x, 9.9.0 through 9.9.7-P1 and 9.10.0 through 9.10.2-P2.
Note
Stability:
  - crash-service-down
SideEffects: []
Reliability: []
Ransomware campaign use Unknown
Source publication date July 28, 2015
Source URL https://github.com/rapid7/metasploit-framework/tree/master/modules/auxiliary/dos/dns/bind_tkey.rb
Vector: AV:N/AC:L/Au:S/C:N/I:N/A:C Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Exploit Prediction Scoring System (EPSS)
Percentile 0.99755
EPSS Score 0.92752
Published At April 1, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-01T13:11:49.765660+00:00 Gentoo Importer Import https://security.gentoo.org/glsa/201510-01 38.0.0