AIX bind Advisory : bind_advisory16.asc (IV98826) (IV98827)

This script is Copyright (C) 2017-2018 Tenable Network Security, Inc.


Synopsis :

The remote AIX host has a version of bind installed that is affected
by multiple security bypass vulnerabilities.

Description :

The version of bind installed on the remote AIX host is affected by
the following vulnerabilities :

- A security bypass exists in the way BIND handles TSIG
authentication for dynamic updates. A remote,
unauthenticated attacker can exploit this, via a
specially crafted request packet containing a valid TSIG
key name, to transfer the target zone. (CVE-2017-3142)

- A security bypass exists in the way BIND handles TSIG
authentication for dynamic updates. A remote,
unauthenticated attacker can exploit this, via a
specially crafted request packet containing a valid TSIG
key name, to force an unauthorized dynamic update.
(CVE-2017-3143)

See also :

http://aix.software.ibm.com/aix/efixes/security/bind_advisory16.asc

Solution :

A fix is available and can be downloaded from the IBM AIX website.

Risk factor :

High / CVSS Base Score : 7.8
(CVSS2#AV:N/AC:L/Au:N/C:N/I:C/A:N)
CVSS Temporal Score : 6.4
(CVSS2#E:F/RL:OF/RC:ND)
Public Exploit Available : true

Family: AIX Local Security Checks

Nessus Plugin ID: 102822 ()

Bugtraq ID: 99337
99339

CVE ID: CVE-2017-3142
CVE-2017-3143

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now