ISC BIND < 9.3.3 DNS Message Malformed TSIG Remote DoS

Medium Nessus Network Monitor Plugin ID 3523

Synopsis

The remote host is vulnerable to a Denial of Service (DoS) attack.

Description

The remote BIND DNS server is vulnerable to a flaw in the way that it handles TSIG responses. An attacker exploiting this flaw would need to have the ability to send malformed responses to the vulnerable DNS Server. Successful exploitation would lead to the BIND server crashing.

Solution

Upgrade to version 9.3.3 or higher.

See Also

http://www.isc.org/index.pl?/sw/bind/bind-security.php

Plugin Details

Severity: Medium

ID: 3523

Family: DNS Servers

Published: 2004/08/18

Updated: 2019/03/06

Dependencies: 1003

Risk Information

Risk Factor: Medium

CVSS v2.0

Base Score: 5

Temporal Score: 4.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Temporal Vector: CVSS2#E:F/RL:U/RC:C

CVSS v3.0

Base Score: 5.3

Temporal Score: 5.1

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

Temporal Vector: CVSS:3.0/E:F/RL:U/RC:C

Vulnerability Information

CPE: cpe:/a:isc:bind:9.3

Reference Information

CVE: CVE-2006-2073

BID: 17692