Bind9 9.8.0 RRSIG Query Type Remote Denial of Service Vulnerability

Medium Nessus Network Monitor Plugin ID 5909

Synopsis

The remote DNS server is vulnerable to a denial of service attack.

Description

The remote host is running Bind, a popular name server.

Bind9 9.8.0 is potentially affected by a denial of service vulnerability. This issue only affects BIND users who use the RPZ feature configured for RRset replacement. When RPZ is being used, a query of type RRSIG for a name configured for RRset replacement will trigger an assertion failure and cause the name server process to exit.

Solution

Upgrade to BIND 9.8.0-P1 or later.

See Also

http://ftp.isc.org/isc/bind9/9.8.0-P1/RELEASE-NOTES-BIND-9.8.0-P1.html

https://www.isc.org/CVE-2011-1907

Plugin Details

Severity: Medium

ID: 5909

File Name: 5909.prm

Family: DNS Servers

Published: 2011/05/09

Modified: 2016/01/21

Nessus ID: 53842

Risk Information

Risk Factor: Medium

CVSSv2

Base Score: 5

Temporal Score: 4.1

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

CVSSv3

Base Score: 5.3

Temporal Score: 4.9

Vector: CVSS3#AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

Temporal Vector: CVSS3#E:F/RL:O/RC:C

Vulnerability Information

Patch Publication Date: 2011/05/05

Vulnerability Publication Date: 2011/05/05

Reference Information

CVE: CVE-2011-1907

BID: 47734

OSVDB: 72172