VID |
19020 |
Severity |
30 |
Port |
53 |
Protocol |
TCP,UDP |
Class |
DNS |
Detailed Description |
The BIND daemon, according to its version number, has multiple denial of service vulnerabilities. ISC BIND (Berkeley Internet Name Daemon) is a server utility that implements the DNS (domain name service) protocol. It is widely used on the Internet. BIND versions prior to 9.2.6-P1 and 9.3.x prior to 9.3.2-P1 and 9.4.x prior to 9.4.0b2 are vulnerable to multiple denial of service vulnerabilities, caused by improper handling of recursive queries and DNS Security Extensions (DNSSEC) signed Resource Record Sets (RRsets). A remote attacker could exploit these vulnerabilities to cause the service to crash.
* Note: This check solely relied on the banner of the remote DNS server to assess this vulnerability, so this might be a false positive.
* References: http://www.isc.org/products/BIND/ http://www.isc.org/index.pl?/sw/bind/bind-security.php http://www.niscc.gov.uk/niscc/docs/re-20060905-00590.pdf?lang=en http://www.kb.cert.org/vuls/id/697164 http://www.kb.cert.org/vuls/id/915404
* Platforms Affected: Internet Software Consortium, BIND versions 9.2.x prior to 9.2.6-P1 or 9.2.7rc2 Internet Software Consortium, BIND versions 9.3.x prior to 9.3.2-P1 or 9.3.3rc2 Internet Software Consortium, BIND versions 9.4.x prior to 9.4.0b2 Any operating system Any version |
Recommendation |
Upgrade to the latest version of BIND (9.4.0b2 / 9.3.3rc2 / 9.3.2-P1 / 9.2.7rc2 / 9.2.6-P1 or later), available from the Internet Software Consortium (ISC) Web site at http://www.isc.org/products/BIND/
For Debian GNU/Linux: Upgrade to the fixed version of BIND, as listed in Debian Security Advisory DSA-1172-1 at http://www.debian.org/security/2006/dsa-1172
For Gentoo Linux: Upgrade to the fixed version of BIND, as listed in Gentoo Linux Security Announcement GLSA 200609-11 at http://www.gentoo.org/security/en/glsa/glsa-200609-11.xml |
Related URL |
CVE-2006-4095,CVE-2006-4096 (CVE) |
Related URL |
19859 (SecurityFocus) |
Related URL |
28744,28745 (ISS) |
|