ISC BIND 9 NSEC3-Signed Zone Handling DoS

Low Nessus Plugin ID 71940


The remote name server may be affected by a denial of service vulnerability.


According to its self-reported version number, the remote installation of BIND is affected by a denial of service vulnerability. This issue exists due to the handling of queries for NSEC3-signed zones related to the memcpy() function in the 'name.c' file on authoritative nameservers.

Note that Nessus has only relied on the version itself and has not attempted to determine whether or not the install is actually affected.


Upgrade to BIND version 9.9.5 / 9.9.4-P2 / 9.8.7 / 9.8.6-P2 / 9.6-ESV-R11 / 9.6-ESV-R10-P2 or later.

See Also

Plugin Details

Severity: Low

ID: 71940

File Name: bind9_994_p2.nasl

Version: 1.15

Type: remote

Family: DNS

Published: 2014/01/14

Updated: 2018/11/15

Dependencies: 10028

Configuration: Enable paranoid mode

Risk Information

Risk Factor: Low

CVSS Score Source: CVE-2014-0591

CVSS v2.0

Base Score: 2.6

Temporal Score: 1.9

Vector: CVSS2#AV:N/AC:H/Au:N/C:N/I:N/A:P

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:isc:bind

Required KB Items: bind/version, Settings/ParanoidReport

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2014/01/13

Vulnerability Publication Date: 2014/01/13

Reference Information

CVE: CVE-2014-0591

BID: 64801