ISC BIND < 9.3.3 DNS Message Malformed TSIG Remote DoS

Medium Nessus Network Monitor Plugin ID 3523

Synopsis

The remote host is vulnerable to a Denial of Service (DoS) attack.

Description

The remote BIND DNS server is vulnerable to a flaw in the way that it handles TSIG responses. An attacker exploiting this flaw would need to have the ability to send malformed responses to the vulnerable DNS Server. Successful exploitation would lead to the BIND server crashing.

Solution

Upgrade to version 9.3.3 or higher.

See Also

http://www.isc.org/index.pl?/sw/bind/bind-security.php

Plugin Details

Severity: Medium

ID: 3523

File Name: 3523.prm

Family: DNS Servers

Published: 2004/08/18

Modified: 2016/05/13

Dependencies: 1003

Risk Information

Risk Factor: Medium

CVSSv2

Base Score: 5

Temporal Score: 4.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Temporal Vector: CVSS2#E:F/RL:U/RC:C

CVSSv3

Base Score: 5.3

Temporal Score: 5.1

Vector: CVSS3#AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

Temporal Vector: CVSS3#E:F/RL:U/RC:C

Vulnerability Information

CPE: cpe:/a:isc:bind:9.3

Reference Information

CVE: CVE-2006-2073

BID: 17692

OSVDB: 57060