FreeBSD : bind -- denial of service vulnerability (ab3e98d9-8175-11e4-907d-d050992ecde8)

This script is Copyright (C) 2014-2016 Tenable Network Security, Inc.

Synopsis :

The remote FreeBSD host is missing one or more security-related

Description :

ISC reports :

We have today posted updated versions of 9.9.6 and 9.10.1 to address a
significant security vulnerability in DNS resolution. The flaw was
discovered by Florian Maury of ANSSI, and applies to any recursive
resolver that does not support a limit on the number of recursions.
[CERTFR-2014-AVI-512], [USCERT VU#264212]

A flaw in delegation handling could be exploited to put named into an
infinite loop, in which each lookup of a name server triggered
additional lookups of more name servers. This has been addressed by
placing limits on the number of levels of recursion named will allow
(default 7), and on the number of queries that it will send before
terminating a recursive query (default 50). The recursion depth limit
is configured via the max-recursion-depth option, and the query limit
via the max-recursion-queries option. For more information, see the
security advisory at
[CVE-2014-8500] [RT #37580]

In addition, we have also corrected a potential security vulnerability
in the GeoIP feature in the 9.10.1 release only. For more information
on this issue, see the security advisory at [CVE-2014-8680]

See also :

Solution :

Update the affected packages.

Risk factor :

High / CVSS Base Score : 7.8
CVSS Temporal Score : 6.8
Public Exploit Available : true

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 79957 ()

Bugtraq ID: 71590

CVE ID: CVE-2014-8500

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now