FreeBSD : dns/bind9* -- zero-length RDATA can cause named to terminate, reveal memory (1ecc0d3f-ae8e-11e1-965b-0024e88a8c98)

high Nessus Plugin ID 59361


The remote FreeBSD host is missing one or more security-related updates.


ISC reports :

Processing of DNS resource records where the rdata field is zero length may cause various issues for the servers handling them.

Processing of these records may lead to unexpected outcomes. Recursive servers may crash or disclose some portion of memory to the client.
Secondary servers may crash on restart after transferring a zone containing these records. Master servers may corrupt zone data if the zone option 'auto-dnssec' is set to 'maintain'. Other unexpected problems that are not listed here may also be encountered.

Impact: This issue primarily affects recursive nameservers.
Authoritative nameservers will only be impacted if an administrator configures experimental record types with no data. If the server is configured this way, then secondaries can crash on restart after transferring that zone. Zone data on the master can become corrupted if the zone with those records has named configured to manage the DNSSEC key rotation.


Update the affected packages.

See Also

Plugin Details

Severity: High

ID: 59361

File Name: freebsd_pkg_1ecc0d3fae8e11e1965b0024e88a8c98.nasl

Version: 1.9

Type: local

Published: 6/5/2012

Updated: 1/6/2021

Risk Information


Risk Factor: Medium

Score: 5.2


Risk Factor: High

Base Score: 8.5

Vector: AV:N/AC:L/Au:N/C:P/I:N/A:C

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:bind96, p-cpe:/a:freebsd:freebsd:bind97, p-cpe:/a:freebsd:freebsd:bind98, p-cpe:/a:freebsd:freebsd:bind99, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 6/4/2012

Vulnerability Publication Date: 6/4/2012

Reference Information

CVE: CVE-2012-1667