VID |
19023 |
Severity |
30 |
Port |
53 |
Protocol |
UDP |
Class |
DNS |
Detailed Description |
According to its self-reported version number, the remote installation of BIND is potentially affected by a denial of service vulnerability. This issue only affects BIND installs that use the RPZ feature configured for RRset replacement. When RPZ is being used, a query of type RRSIG for a name configured for RRset replacement will trigger an assertion failure and cause the name server process to exit.
* Note: This check solely relied on the banner of the remote DNS server to assess this vulnerability, so this might be a false positive.
* References: http://ftp.isc.org/isc/bind9/9.8.0-P1/RELEASE-NOTES-BIND-9.8.0-P1.html https://www.isc.org/CVE-2011-1907
* Platforms Affected: Internet Software Consortium, BIND version 9.8.0 Any operating system Any version |
Recommendation |
Upgrade to the latest version of BIND (9.8.0-P1 or later), available from the Internet Software Consortium (ISC) Web site at http://www.isc.org/products/BIND/ |
Related URL |
CVE-2011-1907 (CVE) |
Related URL |
47734 (SecurityFocus) |
Related URL |
(ISS) |
|