FreeBSD : nsd -- Denial of Service (17f369dc-d7e7-11e1-90a2-000c299b62e1)

high Nessus Plugin ID 60150

Synopsis

The remote FreeBSD host is missing a security-related update.

Description

Tom Hendrikx reports :

It is possible to crash (SIGSEGV) a NSD child server process by sending it a DNS packet from any host on the internet and the per zone stats build option is enabled. A crashed child process will automatically be restarted by the parent process, but an attacker may keep the NSD server occupied restarting child processes by sending it a stream of such packets effectively preventing the NSD server to serve.

Solution

Update the affected package.

See Also

https://www.nlnetlabs.nl/404/

http://www.nessus.org/u?c842063b

Plugin Details

Severity: High

ID: 60150

File Name: freebsd_pkg_17f369dcd7e711e190a2000c299b62e1.nasl

Version: 1.7

Type: local

Published: 7/30/2012

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P

CVSS v3

Risk Factor: High

Base Score: 7.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:nsd, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 7/27/2012

Vulnerability Publication Date: 7/27/2012

Reference Information

CVE: CVE-2012-2979