ISC BIND 9 NSEC3-Signed Zone Handling DoS

Low Nessus Plugin ID 71940

Synopsis

The remote name server may be affected by a denial of service vulnerability.

Description

According to its self-reported version number, the remote installation of BIND is affected by a denial of service vulnerability. This issue exists due to the handling of queries for NSEC3-signed zones related to the memcpy() function in the 'name.c' file on authoritative nameservers.

Note that Nessus has only relied on the version itself and has not attempted to determine whether or not the install is actually affected.

Solution

Upgrade to BIND version 9.9.5 / 9.9.4-P2 / 9.8.7 / 9.8.6-P2 / 9.6-ESV-R11 / 9.6-ESV-R10-P2 or later.

See Also

https://kb.isc.org/docs/aa-01078

https://kb.isc.org/docs/aa-01085

http://www.nessus.org/u?a4865c67

http://www.nessus.org/u?fb52a286

http://ftp.isc.org/isc/bind9/9.8.6-P2/RELEASE-NOTES-BIND-9.8.6-P2.txt

http://www.nessus.org/u?d2ca0d76

http://ftp.isc.org/isc/bind9/9.9.4-P2/RELEASE-NOTES-BIND-9.9.4-P2.txt

http://www.nessus.org/u?1c70dc0f

Plugin Details

Severity: Low

ID: 71940

File Name: bind9_994_p2.nasl

Version: 1.15

Type: remote

Family: DNS

Published: 2014/01/14

Updated: 2018/11/15

Dependencies: 10028

Configuration: Enable paranoid mode

Risk Information

Risk Factor: Low

CVSS Score Source: CVE-2014-0591

CVSS v2.0

Base Score: 2.6

Temporal Score: 1.9

Vector: CVSS2#AV:N/AC:H/Au:N/C:N/I:N/A:P

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:isc:bind

Required KB Items: bind/version, Settings/ParanoidReport

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2014/01/13

Vulnerability Publication Date: 2014/01/13

Reference Information

CVE: CVE-2014-0591

BID: 64801