ISC BIND 9 Recursive Server prefetch DoS

Medium Nessus Plugin ID 73945


The remote name server may be affected by a denial of service vulnerability.


According to its self-reported version number, the remote installation of BIND is affected by a denial of service vulnerability. The issue exists due to an error in the 'prefetch' feature which can cause named to terminate with a 'REQUIRE' assertion failure if it processes queries whose answers have particular attributes.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.


Upgrade to BIND version 9.10.0-P1 or later.

Alternatively, in 'named.conf', set the 'prefetch' option to '0'.

See Also

Plugin Details

Severity: Medium

ID: 73945

File Name: bind9_9100_p1.nasl

Version: 1.13

Type: remote

Family: DNS

Published: 2014/05/09

Updated: 2019/11/26

Dependencies: 10028

Configuration: Enable paranoid mode

Risk Information

Risk Factor: Medium

CVSS Score Source: CVE-2014-3214

CVSS v2.0

Base Score: 5

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:isc:bind

Required KB Items: bind/version, Settings/ParanoidReport

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2014/05/07

Vulnerability Publication Date: 2014/05/05

Reference Information

CVE: CVE-2014-3214

BID: 67311