This script is Copyright (C) 2007-2016 Tenable Network Security, Inc.
The remote FreeBSD host is missing a security-related update.
A type * (ANY) query response containing multiple RRsets can trigger
an assertion failure.
Certain recursive queries can cause the nameserver to crash by using
memory which has already been freed. Impact : A remote attacker
sending a type * (ANY) query to an authoritative DNS server for a
DNSSEC signed zone can cause the named(8) daemon to exit, resulting in
a Denial of Service.
A remote attacker sending recursive queries can cause the nameserver
to crash, resulting in a Denial of Service. Workaround : There is no
workaround available, but systems which are not authoritative servers
for DNSSEC signed zones are not affected by the first issue; and
systems which do not permit untrusted users to perform recursive DNS
resolution are not affected by the second issue. Note that the default
configuration for named(8) in FreeBSD allows local access only (which
on many systems is equivalent to refusing access to untrusted users).
See also :
Update the affected package.
Risk factor :
High / CVSS Base Score : 7.8
CVSS Temporal Score : 7.8
Public Exploit Available : false
Family: FreeBSD Local Security Checks
Nessus Plugin ID: 24730 (freebsd_pkg_3cb6f059c69d11db9f82000e0c2e438a.nasl)
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now