ISC BIND 9 Recursive Server prefetch DoS

medium Nessus Plugin ID 73945

Synopsis

The remote name server may be affected by a denial of service vulnerability.

Description

According to its self-reported version number, the remote installation of BIND is affected by a denial of service vulnerability. The issue exists due to an error in the 'prefetch' feature which can cause named to terminate with a 'REQUIRE' assertion failure if it processes queries whose answers have particular attributes.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Upgrade to BIND version 9.10.0-P1 or later.

Alternatively, in 'named.conf', set the 'prefetch' option to '0'.

See Also

https://kb.isc.org/docs/aa-01161

https://deepthought.isc.org/article/AA-01162

https://lists.isc.org/pipermail/bind-announce/2014-May/000909.html

Plugin Details

Severity: Medium

ID: 73945

File Name: bind9_9100_p1.nasl

Version: 1.13

Type: remote

Family: DNS

Published: 5/9/2014

Updated: 11/26/2019

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

CVSS Score Source: CVE-2014-3214

Vulnerability Information

CPE: cpe:/a:isc:bind

Required KB Items: Settings/ParanoidReport, bind/version

Exploit Ease: No known exploits are available

Patch Publication Date: 5/7/2014

Vulnerability Publication Date: 5/5/2014

Reference Information

CVE: CVE-2014-3214

BID: 67311