ISC BIND < 9.3.1 Validator Self Checking Remote DoS

medium Nessus Plugin ID 16261

Synopsis

The remote name server is prone to a denial of service attack.

Description

The remote BIND server, according to its version number, has a flaw in the way 'authvalidator()' is implemented.

Provided DNSSEC has been enabled in the remote name server, an attacker may be able to launch a denial of service attack against the remote service.

Solution

Upgrade to BIND 9.3.1 or later.

See Also

http://www.nessus.org/u?cde0d404

Plugin Details

Severity: Medium

ID: 16261

File Name: bind_validator_dos.nasl

Version: 1.23

Type: remote

Family: DNS

Published: 1/26/2005

Updated: 6/27/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.4

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.2

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P

Vulnerability Information

CPE: cpe:/a:isc:bind

Required KB Items: bind/version

Exploit Ease: No known exploits are available

Vulnerability Publication Date: 1/25/2005

Reference Information

CVE: CVE-2005-0034

BID: 12365, 12497

CERT: 938617