This script is Copyright (C) 2013 Tenable Network Security, Inc.
The remote AIX host is missing a security patch.
AIX 'named' is an implementation of BIND (Berkeley Internet Name
Domain) providing server functionality for the Domain Name System
(DNS) Protocol. AIX currently ships and supports three versions of
BIND: 4, 8, and 9.
There is an error in the handling of dynamic update messages in BIND
9. A crafted update packet from a remote user can cause a master
server to assert and exit. The successful exploitation of this
vulnerability allows a remote, unauthenticated user to make a master
DNS server assert and exit.
The following command is vulnerable :
See also :
Install the appropriate interim fix.
Risk factor :
Medium / CVSS Base Score : 4.3
Public Exploit Available : true