FreeBSD : bind -- Multiple Denial of Service vulnerabilities (3cb6f059-c69d-11db-9f82-000e0c2e438a)

This script is Copyright (C) 2007-2016 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing a security-related update.

Description :

A type * (ANY) query response containing multiple RRsets can trigger
an assertion failure.

Certain recursive queries can cause the nameserver to crash by using
memory which has already been freed. Impact : A remote attacker
sending a type * (ANY) query to an authoritative DNS server for a
DNSSEC signed zone can cause the named(8) daemon to exit, resulting in
a Denial of Service.

A remote attacker sending recursive queries can cause the nameserver
to crash, resulting in a Denial of Service. Workaround : There is no
workaround available, but systems which are not authoritative servers
for DNSSEC signed zones are not affected by the first issue; and
systems which do not permit untrusted users to perform recursive DNS
resolution are not affected by the second issue. Note that the default
configuration for named(8) in FreeBSD allows local access only (which
on many systems is equivalent to refusing access to untrusted users).

See also :

http://www.nessus.org/u?83b3b85e

Solution :

Update the affected package.

Risk factor :

High / CVSS Base Score : 7.8
(CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C)
CVSS Temporal Score : 7.8
(CVSS2#E:ND/RL:ND/RC:C)
Public Exploit Available : false

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 24730 (freebsd_pkg_3cb6f059c69d11db9f82000e0c2e438a.nasl)

Bugtraq ID: 22229
22231

CVE ID: CVE-2007-0493
CVE-2007-0494

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now