This script is Copyright (C) 2006-2016 Tenable Network Security, Inc.
The remote FreeBSD host is missing a security-related update.
Problem Description For a recursive DNS server, a remote attacker
sending enough recursive queries for the replies to arrive after all
the interested clients have left the recursion queue will trigger an
INSIST failure in the named(8) daemon. Also for a recursive DNS
server, an assertion failure can occur when processing a query whose
reply will contain more than one SIG(covered) RRset.
For an authoritative DNS server serving a RFC 2535 DNSSEC zone which
is queried for the SIG records where there are multiple SIG(covered)
RRsets (e.g. a zone apex), named(8) will trigger an assertion failure
when it tries to construct the response. Impact An attacker who can
perform recursive lookups on a DNS server and is able to send a
sufficiently large number of recursive queries, or is able to get the
DNS server to return more than one SIG(covered) RRsets can stop the
functionality of the DNS service.
An attacker querying an authoritative DNS server serving a RFC 2535
DNSSEC zone may be able to crash the DNS server. Workaround A possible
workaround is to only allow trusted clients to perform recursive
See also :
Update the affected package.
Risk factor :
Medium / CVSS Base Score : 5.0
CVSS Temporal Score : 5.0
Public Exploit Available : false
Family: FreeBSD Local Security Checks
Nessus Plugin ID: 23953 (freebsd_pkg_ef3306fc8f9b11dbab33000e0c2e438a.nasl)
Bugtraq ID: 19859
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now