This script is Copyright (C) 2017 Tenable Network Security, Inc.
The remote AIX host has a version of bind installed that is affected
by multiple vulnerabilities.
The version of bind installed on the remote AIX host is affected by
the following vulnerabilities :
- The TLS protocol allows weaker than expected security caused by a
collision attack when using the MD5 hash function for signing a
ServerKeyExchange message during a TLS handshake. An attacker can
exploit this vulnerability using man-in-the-middle techniques to
impersonate a TLS server and obtain credentials. (CVE-2015-7575)
- IBM AIX does not require the newest version of TLS by default
which allows a remote attacker to obtain sensitive information
using man in the middle techniques. (CVE-2016-0266)
See also :
A fix is available and can be downloaded from the IBM AIX website.
Risk factor :
Medium / CVSS Base Score : 4.3
CVSS Temporal Score : 3.7
Public Exploit Available : false