AIX bind Advisory : bind_advisory14.asc (IV91214) (IV91253) (IV91254) (IV91255) (IV91256) (IV91257)

This script is Copyright (C) 2017 Tenable Network Security, Inc.


Synopsis :

The remote AIX host has a version of bind installed that is affected
by multiple denial of service vulnerabilities.

Description :

The version of bind installed on the remote AIX host is affected by
the following vulnerabilities :

- A denial of service vulnerability exists when handling
malformed options sections. An unauthenticated, remote
attacker can exploit this, via a specially crafted OPT
resource record, to cause an assertion failure,
resulting in a daemon exit. (CVE-2016-2848)

- A denial of service vulnerability exists due to improper
handling of a recursive response containing a DNAME
record in the answer section. An unauthenticated, remote
attacker can exploit this to cause an assertion failure
and daemon exit. (CVE-2016-8864)

See also :

http://aix.software.ibm.com/aix/efixes/security/bind_advisory14.asc

Solution :

A fix is available and can be downloaded from the IBM AIX website.

Risk factor :

High / CVSS Base Score : 7.8
(CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C)
CVSS Temporal Score : 6.4
(CVSS2#E:F/RL:OF/RC:ND)
Public Exploit Available : true

Family: AIX Local Security Checks

Nessus Plugin ID: 102126 ()

Bugtraq ID: 93814
94067

CVE ID: CVE-2016-2848
CVE-2016-8864

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now