ISC BIND < 9.3.3 DNS Message Malformed TSIG Remote DoS

medium Nessus Network Monitor Plugin ID 3523

Synopsis

The remote host is vulnerable to a Denial of Service (DoS) attack.

Description

The remote BIND DNS server is vulnerable to a flaw in the way that it handles TSIG responses. An attacker exploiting this flaw would need to have the ability to send malformed responses to the vulnerable DNS Server. Successful exploitation would lead to the BIND server crashing.

Solution

Upgrade to version 9.3.3 or higher.

See Also

http://www.isc.org/index.pl?/sw/bind/bind-security.php

Plugin Details

Severity: Medium

ID: 3523

Family: DNS Servers

Published: 8/18/2004

Updated: 3/6/2019

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 4.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

CVSS v3

Risk Factor: Medium

Base Score: 5.3

Temporal Score: 5.2

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

Temporal Vector: CVSS:3.0/E:F/RL:U/RC:C

Vulnerability Information

CPE: cpe:/a:isc:bind:9.3

Reference Information

CVE: CVE-2006-2073

BID: 17692