AIX bind Advisory : nettcp_advisory2.asc (IV86116) (IV86117) (IV86118) (IV86119) (IV86120) (IV86132)

This script is Copyright (C) 2017 Tenable Network Security, Inc.


Synopsis :

The remote AIX host has a version of bind installed that is affected
by multiple vulnerabilities.

Description :

The version of bind installed on the remote AIX host is affected by
the following vulnerabilities :

- The TLS protocol allows weaker than expected security caused by a
collision attack when using the MD5 hash function for signing a
ServerKeyExchange message during a TLS handshake. An attacker can
exploit this vulnerability using man-in-the-middle techniques to
impersonate a TLS server and obtain credentials. (CVE-2015-7575)

- IBM AIX does not require the newest version of TLS by default
which allows a remote attacker to obtain sensitive information
using man in the middle techniques. (CVE-2016-0266)

See also :

http://aix.software.ibm.com/aix/efixes/security/nettcp_advisory2.asc

Solution :

A fix is available and can be downloaded from the IBM AIX website.

Risk factor :

Medium / CVSS Base Score : 4.3
(CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N)
CVSS Temporal Score : 3.7
(CVSS2#E:U/RL:ND/RC:C)
Public Exploit Available : false

Family: AIX Local Security Checks

Nessus Plugin ID: 104123 ()

Bugtraq ID: 79684
92150

CVE ID: CVE-2015-7575
CVE-2016-0266

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now