FreeBSD : BIND -- multiple vulnerabilities (d4c7e9a9-d893-11e6-9b4d-d050996490d0)

This script is Copyright (C) 2017 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing one or more security-related
updates.

Description :

ISC reports :

A malformed query response received by a recursive server in response
to a query of RTYPE ANY could trigger an assertion failure while named
is attempting to add the RRs in the query response to the cache.

Depending on the type of query and the EDNS options in the query they
receive, DNSSEC-enabled authoritative servers are expected to include
RRSIG and other RRsets in their responses to recursive servers.
DNSSEC-validating servers will also make specific queries for DS and
other RRsets. Whether DNSSEC-validating or not, an error in processing
malformed query responses that contain DNSSEC-related RRsets that are
inconsistent with other RRsets in the same query response can trigger
an assertion failure. Although the combination of properties which
triggers the assertion should not occur in normal traffic, it is
potentially possible for the assertion to be triggered deliberately by
an attacker sending a specially-constructed answer.

An unusually-formed answer containing a DS resource record could
trigger an assertion failure. While the combination of properties
which triggers the assertion should not occur in normal traffic, it is
potentially possible for the assertion to be triggered deliberately by
an attacker sending a specially-constructed answer having the required
properties.

An error in handling certain queries can cause an assertion failure
when a server is using the nxdomain-redirect feature to cover a zone
for which it is also providing authoritative service. A vulnerable
server could be intentionally stopped by an attacker if it was using a
configuration that met the criteria for the vulnerability and if the
attacker could cause it to accept a query that possessed the required
attributes.

See also :

https://kb.isc.org/article/AA-01439/0
https://kb.isc.org/article/AA-01440/0
https://kb.isc.org/article/AA-01441/0
https://kb.isc.org/article/AA-01442/0
http://www.nessus.org/u?d7d19d2f

Solution :

Update the affected packages.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P)

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 96473 ()

Bugtraq ID:

CVE ID: CVE-2016-9131
CVE-2016-9147
CVE-2016-9444
CVE-2016-9778

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now