VID |
19031 |
Severity |
30 |
Port |
53 |
Protocol |
UDP |
Class |
DNS |
Detailed Description |
ISC BIND (Berkeley Internet Name Daemon) is a server utility that implements the DNS (domain name service) protocol. It is widely used on the Internet. The BIND daemon, according to its version number, can be forced to crash via maliciously crafted DNS requests. Note that this vulnerability only affects installs using the 'dns64' configuration option.
* Note: This check solely relied on the banner of the remote DNS server to assess this vulnerability, so this might be a false positive.
* References: http://www.isc.org/software/bind/advisories/cve-2012-5688 https://kb.isc.org/article/AA-00828 http://ftp.isc.org/isc/bind9/9.8.4-P1/CHANGES http://ftp.isc.org/isc/bind9/9.9.2-P1/CHANGES
* Platforms Affected: Internet Software Consortium, BIND version 9.8.4 < 9.8.4-P1 Internet Software Consortium, BIND version 9.9.2 < 9.9.2-P1 Any operating system Any version |
Recommendation |
Upgrade to the latest version of BIND (9.8.4-P1 / 9.9.2-P1 or later), available from the Internet Software Consortium (ISC) Web site at http://www.isc.org/products/BIND/ |
Related URL |
CVE-2012-5688 (CVE) |
Related URL |
56817 (SecurityFocus) |
Related URL |
(ISS) |
|