SynopsisThe remote DNS server is vulnerable to multiple attack vectors.
DescriptionThe remote host is running BIND, and open source name server.
Versions of BIND 9.7 earlier than 9.7.2 P2 are potentially affected by multiple vulnerabilities :
- If BIND, acting as a DNSSEC validating server, has two or more trust anchors configured in named.conf for the same zone and the response for a record in that zone from the authoritative server includes a bad signature, the validating server will crash while trying to validate the query.
- A flaw exists that allows access to a cache via recursion even if the ACL disallows it.
SolutionUpgrade to BIND 9.7.1 P2 or later.