ISC BIND 9 < 9.9.10-P2 / 9.9.10-S3 / 9.10.5-P2 / 9.10.5-S3 / 9.11.1-P2 Multiple Vulnerabilities

High Nessus Plugin ID 101232

Synopsis

The remote name server is affected by multiple vulnerabilities.

Description

According to its self-reported version, the instance of ISC BIND 9 running on the remote name server is 9.9.x prior to 9.9.10-P2 or 9.9.10-S3, 9.10.x prior to 9.10.5-P2 or 9.10.5-S3, or 9.11.x prior to 9.11.1-P2. It is, therefore, affected by multiple vulnerabilities :

- A flaw exists in the Transaction Signature (TSIG) authentication implementation when handling received messages. An unauthenticated, remote attacker can exploit this, via a specially crafted request packet, to circumvent TSIG authentication of AXFR requests. Note that to exploit this issue the attacker must be able to send and receive messages to an authoritative DNS server and have knowledge of a valid TSIG key name.
(CVE-2017-3142)

- A flaw exists in the Transaction Signature (TSIG) authentication implementation when handling messages.
An unauthenticated, remote attacker can exploit this to manipulate BIND into accepting an unauthorized dynamic update. Note that to exploit this issue the attacker must be able to send and receive messages to an authoritative DNS server and have knowledge of a valid TSIG key name for the zone and service being targeted.
(CVE-2017-3143)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade to ISC BIND version 9.9.10-P2 / 9.9.10-S3 / 9.10.5-P2 / 9.10.5-S3 / 9.11.1-P2 or later.

See Also

https://kb.isc.org/article/AA-01503

https://kb.isc.org/article/AA-01504

https://kb.isc.org/article/AA-01505

https://kb.isc.org/article/AA-01506

https://kb.isc.org/article/AA-01507

https://kb.isc.org/article/AA-01508

https://kb.isc.org/article/AA-01509

Plugin Details

Severity: High

ID: 101232

File Name: bind9_CVE-2017-3143.nasl

Version: 1.6

Type: remote

Family: DNS

Published: 2017/07/05

Modified: 2018/06/29

Dependencies: 10028

Risk Information

Risk Factor: High

CVSS v2.0

Base Score: 7.8

Temporal Score: 5.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:C/A:N

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

CVSS v3.0

Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:isc:bind

Required KB Items: bind/version, Settings/ParanoidReport

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2017/06/29

Vulnerability Publication Date: 2017/06/29

Reference Information

CVE: CVE-2017-3142, CVE-2017-3143

BID: 99337, 99339