ISC BIND 9 NSEC3-Signed Zone Handling DoS

low Nessus Plugin ID 71940


The remote name server may be affected by a denial of service vulnerability.


According to its self-reported version number, the remote installation of BIND is affected by a denial of service vulnerability. This issue exists due to the handling of queries for NSEC3-signed zones related to the memcpy() function in the 'name.c' file on authoritative nameservers.

Note that Nessus has only relied on the version itself and has not attempted to determine whether or not the install is actually affected.


Upgrade to BIND version 9.9.5 / 9.9.4-P2 / 9.8.7 / 9.8.6-P2 / 9.6-ESV-R11 / 9.6-ESV-R10-P2 or later.

See Also

Plugin Details

Severity: Low

ID: 71940

File Name: bind9_994_p2.nasl

Version: 1.15

Type: remote

Family: DNS

Published: 1/14/2014

Updated: 11/15/2018

Configuration: Enable paranoid mode

Risk Information


Risk Factor: Low

Score: 3.6


Risk Factor: Low

Base Score: 2.6

Temporal Score: 1.9

Vector: AV:N/AC:H/Au:N/C:N/I:N/A:P

Temporal Vector: E:U/RL:OF/RC:C

CVSS Score Source: CVE-2014-0591

Vulnerability Information

CPE: cpe:/a:isc:bind

Required KB Items: bind/version, Settings/ParanoidReport

Exploit Ease: No known exploits are available

Patch Publication Date: 1/13/2014

Vulnerability Publication Date: 1/13/2014

Reference Information

CVE: CVE-2014-0591

BID: 64801