AIX 6.1 TL 0 : bind (IZ56315)

medium Nessus Plugin ID 63794

Synopsis

The remote AIX host is missing a security patch.

Description

AIX 'named' is an implementation of BIND (Berkeley Internet Name Domain) providing server functionality for the Domain Name System (DNS) Protocol. AIX currently ships and supports three versions of BIND: 4, 8, and 9.

There is an error in the handling of dynamic update messages in BIND 9. A crafted update packet from a remote user can cause a master server to assert and exit. The successful exploitation of this vulnerability allows a remote, unauthenticated user to make a master DNS server assert and exit.

The following command is vulnerable :

/usr/sbin/named9.

Solution

Install the appropriate interim fix.

See Also

https://www.isc.org/node/474

https://aix.software.ibm.com/aix/efixes/security/bind_advisory.asc

Plugin Details

Severity: Medium

ID: 63794

File Name: aix_IZ56315.nasl

Version: 1.5

Type: local

Published: 1/24/2013

Updated: 4/21/2023

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.1

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P

Vulnerability Information

CPE: cpe:/o:ibm:aix:6.1

Required KB Items: Host/local_checks_enabled, Host/AIX/version, Host/AIX/lslpp

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 8/5/2009

Vulnerability Publication Date: 8/5/2009

Exploitable With

Core Impact

Reference Information

CVE: CVE-2009-0696

CWE: 16