The remote name server is affected by a cache poisoning vulnerability.
According to its version number, the remote installation of BIND suffers from a cache poisoning vulnerability. This issue affects all versions prior to 9.4.3-P5, 9.5.2-P2 or 9.6.1-P3. Note that only nameservers that allow recursive queries and validate DNSSEC records are affected. Nessus has not attempted to verify if this configuration applies to the remote service, though, so this could be a false positive.
Upgrade to BIND 9.4.3-P5 / 9.5.2-P2 / 9.6.1-P3 or later.