ISC BIND 9 NSEC3-Signed Zone Handling DoS

low Nessus Plugin ID 71940

Synopsis

The remote name server may be affected by a denial of service vulnerability.

Description

According to its self-reported version number, the remote installation of BIND is affected by a denial of service vulnerability. This issue exists due to the handling of queries for NSEC3-signed zones related to the memcpy() function in the 'name.c' file on authoritative nameservers.

Note that Nessus has only relied on the version itself and has not attempted to determine whether or not the install is actually affected.

Solution

Upgrade to BIND version 9.9.5 / 9.9.4-P2 / 9.8.7 / 9.8.6-P2 / 9.6-ESV-R11 / 9.6-ESV-R10-P2 or later.

See Also

https://kb.isc.org/docs/aa-01078

https://kb.isc.org/docs/aa-01085

http://www.nessus.org/u?a4865c67

http://www.nessus.org/u?fb52a286

http://ftp.isc.org/isc/bind9/9.8.6-P2/RELEASE-NOTES-BIND-9.8.6-P2.txt

http://www.nessus.org/u?d2ca0d76

http://ftp.isc.org/isc/bind9/9.9.4-P2/RELEASE-NOTES-BIND-9.9.4-P2.txt

http://www.nessus.org/u?1c70dc0f

Plugin Details

Severity: Low

ID: 71940

File Name: bind9_994_p2.nasl

Version: 1.15

Type: remote

Family: DNS

Published: 1/14/2014

Updated: 11/15/2018

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Low

Base Score: 2.6

Temporal Score: 1.9

Vector: CVSS2#AV:N/AC:H/Au:N/C:N/I:N/A:P

CVSS Score Source: CVE-2014-0591

Vulnerability Information

CPE: cpe:/a:isc:bind

Required KB Items: Settings/ParanoidReport, bind/version

Exploit Ease: No known exploits are available

Patch Publication Date: 1/13/2014

Vulnerability Publication Date: 1/13/2014

Reference Information

CVE: CVE-2014-0591

BID: 64801