Bind9 9.8.0 RRSIG Query Type Remote Denial of Service Vulnerability

Medium Nessus Network Monitor Plugin ID 5909


The remote DNS server is vulnerable to a denial of service attack.


The remote host is running Bind, a popular name server.

Bind9 9.8.0 is potentially affected by a denial of service vulnerability. This issue only affects BIND users who use the RPZ feature configured for RRset replacement. When RPZ is being used, a query of type RRSIG for a name configured for RRset replacement will trigger an assertion failure and cause the name server process to exit.


Upgrade to BIND 9.8.0-P1 or later.

See Also

Plugin Details

Severity: Medium

ID: 5909

File Name: 5909.prm

Family: DNS Servers

Published: 2011/05/09

Modified: 2016/01/21

Nessus ID: 53842

Risk Information

Risk Factor: Medium


Base Score: 5

Temporal Score: 4.1

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Temporal Vector: CVSS2#E:F/RL:OF/RC:C


Base Score: 5.3

Temporal Score: 4.9


Temporal Vector: CVSS3#E:F/RL:O/RC:C

Vulnerability Information

Patch Publication Date: 2011/05/05

Vulnerability Publication Date: 2011/05/05

Reference Information

CVE: CVE-2011-1907

BID: 47734

OSVDB: 72172