AIX bind Advisory : bind_advisory13.asc (IV89828) (IV89829) (IV89830) (IV89831) (IV90056)

This script is Copyright (C) 2017 Tenable Network Security, Inc.


Synopsis :

The remote AIX host has a version of bind installed that is affected
by multiple denial of service vulnerabilities.

Description :

The version of bind installed on the remote AIX host is affected by
the following vulnerabilities :

- A denial of service vulnerability exists due to an error
in the lightweight resolver (lwres) protocol
implementation when resolving a query name that, when
combined with a search list entry, exceeds the maximum
allowable length. An unauthenticated, remote attacker
can exploit this to cause a segmentation fault,
resulting in a denial of service condition. This issue
occurs when lwresd or the the named 'lwres' option is
enabled. (CVE-2016-2775)

- A denial of service vulnerability exists within file
buffer.c due to improper construction of responses to
crafted requests. An unauthenticated, remote attacker
can exploit this, via a specially crafted query, to
cause an assertion failure, resulting in a daemon exit.
(CVE-2016-2776)

See also :

http://aix.software.ibm.com/aix/efixes/security/bind_advisory13.asc

Solution :

A fix is available and can be downloaded from the IBM AIX website.

Risk factor :

High / CVSS Base Score : 7.8
(CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C)
CVSS Temporal Score : 6.4
(CVSS2#E:F/RL:OF/RC:ND)
Public Exploit Available : true

Family: AIX Local Security Checks

Nessus Plugin ID: 102125 ()

Bugtraq ID: 92037
93188

CVE ID: CVE-2016-2775
CVE-2016-2776

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now