AIX bind Advisory : nettcp_advisory2.asc (IV86116) (IV86117) (IV86118) (IV86119) (IV86120) (IV86132)

medium Nessus Plugin ID 104123


The remote AIX host has a version of bind installed that is affected by multiple vulnerabilities.


The version of bind installed on the remote AIX host is affected by the following vulnerabilities :

- The TLS protocol allows weaker than expected security caused by a collision attack when using the MD5 hash function for signing a ServerKeyExchange message during a TLS handshake. An attacker can exploit this vulnerability using man-in-the-middle techniques to impersonate a TLS server and obtain credentials. (CVE-2015-7575)

- IBM AIX does not require the newest version of TLS by default which allows a remote attacker to obtain sensitive information using man in the middle techniques. (CVE-2016-0266)


A fix is available and can be downloaded from the IBM AIX website.

See Also

Plugin Details

Severity: Medium

ID: 104123

File Name: aix_bind_nettcp_advisory2.nasl

Version: 3.9

Type: local

Published: 10/24/2017

Updated: 4/21/2023

Supported Sensors: Nessus

Risk Information


Risk Factor: Medium

Score: 4.4


Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.2

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N


Risk Factor: Medium

Base Score: 5.9

Temporal Score: 5.2

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:ibm:aix, cpe:/a:isc:bind

Required KB Items: Host/local_checks_enabled, Host/AIX/version, Host/AIX/lslpp

Patch Publication Date: 6/26/2016

Vulnerability Publication Date: 6/26/2016

Reference Information

CVE: CVE-2015-7575, CVE-2016-0266

BID: 79684, 92150