DNS Server Dynamic Update Record Injection

Medium Nessus Plugin ID 35372

Synopsis

The remote DNS server allows dynamic updates.

Description

It was possible to add a record into a zone using the DNS dynamic update protocol, as described by RFC 2136.

This protocol can be used by DHCP clients to enter their host names into the DNS maps, but it could be subverted by malicious users to redirect network traffic.

Solution

Ignore this warning if the scanner address is in the range of IP addresses that are allowed to perform updates.

Limit addresses that are allowed to do dynamic updates (eg, with BIND's 'allow-update' option) or implement TSIG or SIG(0).

Plugin Details

Severity: Medium

ID: 35372

File Name: dns_dyn_update.nasl

Version: Revision: 1.11

Type: remote

Family: DNS

Published: 2009/01/15

Updated: 2015/09/24

Dependencies: 11002, 35371

Risk Information

Risk Factor: Medium

CVSS v2.0

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N