AIX 6.1 TL 0 : bind (IZ56315)

This script is Copyright (C) 2013 Tenable Network Security, Inc.


Synopsis :

The remote AIX host is missing a security patch.

Description :

AIX 'named' is an implementation of BIND (Berkeley Internet Name
Domain) providing server functionality for the Domain Name System
(DNS) Protocol. AIX currently ships and supports three versions of
BIND: 4, 8, and 9.

There is an error in the handling of dynamic update messages in BIND
9. A crafted update packet from a remote user can cause a master
server to assert and exit. The successful exploitation of this
vulnerability allows a remote, unauthenticated user to make a master
DNS server assert and exit.

The following command is vulnerable :

/usr/sbin/named9.

See also :

https://www.isc.org/node/474
http://aix.software.ibm.com/aix/efixes/security/bind_advisory.asc

Solution :

Install the appropriate interim fix.

Risk factor :

Medium / CVSS Base Score : 4.3
(CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P)
Public Exploit Available : true

Family: AIX Local Security Checks

Nessus Plugin ID: 63794 ()

Bugtraq ID:

CVE ID: CVE-2009-0696

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now