ISC BIND 9 Recursive Server prefetch DoS

medium Nessus Plugin ID 73945


The remote name server may be affected by a denial of service vulnerability.


According to its self-reported version number, the remote installation of BIND is affected by a denial of service vulnerability. The issue exists due to an error in the 'prefetch' feature which can cause named to terminate with a 'REQUIRE' assertion failure if it processes queries whose answers have particular attributes.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.


Upgrade to BIND version 9.10.0-P1 or later.

Alternatively, in 'named.conf', set the 'prefetch' option to '0'.

See Also

Plugin Details

Severity: Medium

ID: 73945

File Name: bind9_9100_p1.nasl

Version: 1.13

Type: remote

Family: DNS

Published: 5/9/2014

Updated: 11/26/2019

Configuration: Enable paranoid mode

Risk Information

CVSS Score Source: CVE-2014-3214


Risk Factor: Low

Score: 3.6


Risk Factor: Medium

Base Score: 5

Temporal Score: 3.7

Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Temporal Vector: E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:isc:bind

Required KB Items: bind/version, Settings/ParanoidReport

Exploit Ease: No known exploits are available

Patch Publication Date: 5/7/2014

Vulnerability Publication Date: 5/5/2014

Reference Information

CVE: CVE-2014-3214

BID: 67311