AIX bind Advisory : nettcp_advisory2.asc (IV86116) (IV86117) (IV86118) (IV86119) (IV86120) (IV86132)

Medium Nessus Plugin ID 104123


The remote AIX host has a version of bind installed that is affected by multiple vulnerabilities.


The version of bind installed on the remote AIX host is affected by the following vulnerabilities :

- The TLS protocol allows weaker than expected security caused by a collision attack when using the MD5 hash function for signing a ServerKeyExchange message during a TLS handshake. An attacker can exploit this vulnerability using man-in-the-middle techniques to impersonate a TLS server and obtain credentials. (CVE-2015-7575)

- IBM AIX does not require the newest version of TLS by default which allows a remote attacker to obtain sensitive information using man in the middle techniques. (CVE-2016-0266)


A fix is available and can be downloaded from the IBM AIX website.

See Also

Plugin Details

Severity: Medium

ID: 104123

File Name: aix_bind_nettcp_advisory2.nasl

Version: $Revision: 3.3 $

Type: local

Published: 2017/10/24

Modified: 2017/12/21

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 4.3

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

Temporal Vector: CVSS2#E:U/RL:ND/RC:C


Base Score: 5.9

Temporal Score: 5.4

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

Temporal Vector: CVSS:3.0/E:U/RL:X/RC:C

Vulnerability Information

CPE: cpe:/o:ibm:aix, cpe:/a:isc:bind

Required KB Items: Host/AIX/lslpp, Host/local_checks_enabled, Host/AIX/version

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2016/06/26

Vulnerability Publication Date: 2016/06/26

Reference Information

CVE: CVE-2015-7575, CVE-2016-0266

BID: 79684, 92150

OSVDB: 132305