ISC BIND 9 < 9.9.9-P6 / 9.9.9-S8 / 9.10.4-P6 / 9.11.0-P3 DNS64 and RPZ DoS
High Nessus Plugin ID 97227
SynopsisThe remote name server is affected by a denial of service vulnerability.
DescriptionAccording to its self-reported version number, the instance of ISC BIND 9 running on the remote name server is 9.8.8 or 9.9.x prior to 9.9.9-P6 or 9.9.9-S8, 9.10.x prior to 9.10.4-P6, or 9.11.x prior to 9.11.0-P3. It is, therefore, affected by a denial of service vulnerability in the query_find() function in query.c that is triggered when using DNS64 and RPZ simultaneously for rewriting query responses. An unauthenticated, remote attacker can exploit this to cause an INSIST assertion failure or a NULL pointer read, resulting in a termination of the service.
Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.
SolutionUpgrade to ISC BIND version 9.9.9-P6 / 9.9.9-S8 / 9.10.4-P6 / 9.11.0-P3 or later. Alternatively, remove either DNS64 or RPZ from the configuration.