FreeBSD : dns/bind9* -- A recursive resolver can be crashed by a query for a malformed zone (72f35727-ce83-11e2-be04-005056a37f68)

High Nessus Plugin ID 66837


The remote FreeBSD host is missing one or more security-related updates.


ISC reports :

A bug has been discovered in the most recent releases of BIND 9 which has the potential for deliberate exploitation as a denial-of-service attack. By sending a recursive resolver a query for a record in a specially malformed zone, an attacker can cause BIND 9 to exit with a fatal 'RUNTIME_CHECK' error in resolver.c.


Update the affected packages.

See Also

Plugin Details

Severity: High

ID: 66837

File Name: freebsd_pkg_72f35727ce8311e2be04005056a37f68.nasl

Version: $Revision: 1.6 $

Type: local

Published: 2013/06/07

Modified: 2013/08/03

Dependencies: 12634

Risk Information

Risk Factor: High


Base Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:bind96, p-cpe:/a:freebsd:freebsd:bind96-base, p-cpe:/a:freebsd:freebsd:bind98, p-cpe:/a:freebsd:freebsd:bind98-base, p-cpe:/a:freebsd:freebsd:bind99, p-cpe:/a:freebsd:freebsd:bind99-base, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 2013/06/06

Vulnerability Publication Date: 2013/06/04

Reference Information

CVE: CVE-2013-3919