This script is Copyright (C) 2012-2016 Tenable Network Security, Inc.
The remote Gentoo host is missing one or more security-related
The remote host is affected by the vulnerability described in GLSA-201209-04
(BIND: Multiple vulnerabilities)
Multiple vulnerabilities have been discovered in BIND:
Domain names are not properly revoked due to an error in the cache
update policy (CVE-2012-1033).
BIND accepts records with zero-length RDATA fields (CVE-2012-1667).
An assertion failure from the failing-query cache could occur when
DNSSEC validation is enabled (CVE-2012-3817).
A memory leak may occur under high TCP query loads (CVE-2012-3868).
An assertion error can occur when a query is performed for a record
with RDATA greater than 65535 bytes (CVE-2012-4244).
A remote attacker may be able to cause a Denial of Service condition or
keep domain names resolvable after it has been deleted from registration.
There is no known workaround at this time.
See also :
All BIND users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose '>=net-dns/bind-9.9.1_p3'
Risk factor :
High / CVSS Base Score : 8.5
CVSS Temporal Score : 6.3
Public Exploit Available : false
Family: Gentoo Local Security Checks
Nessus Plugin ID: 62237 ()
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now