AIX 6.1 TL 2 : bind (IZ56317)

This script is Copyright (C) 2013 Tenable Network Security, Inc.

Synopsis :

The remote AIX host is missing a security patch.

Description :

AIX 'named' is an implementation of BIND (Berkeley Internet Name
Domain) providing server functionality for the Domain Name System
(DNS) Protocol. AIX currently ships and supports three versions of
BIND: 4, 8, and 9.

There is an error in the handling of dynamic update messages in BIND
9. A crafted update packet from a remote user can cause a master
server to assert and exit. The successful exploitation of this
vulnerability allows a remote, unauthenticated user to make a master
DNS server assert and exit.

The following command is vulnerable :


See also :

Solution :

Install the appropriate interim fix.

Risk factor :

Medium / CVSS Base Score : 4.3
Public Exploit Available : true

Family: AIX Local Security Checks

Nessus Plugin ID: 63796 ()

Bugtraq ID:

CVE ID: CVE-2009-0696

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now