VID |
19085 |
Severity |
30 |
Port |
53 |
Protocol |
UDP |
Class |
DNS |
Detailed Description |
According to its self-reported version, the instance of ISC BIND 9 running on the remote name server is 9.12.0 or 9.12.1. It is, therefore, affected by an allow-recursion vulnerability which exists in the named.conf due to a regression issue introduced by change #4777.
* Note: This check solely relied on the banner of the remote DNS server to assess this vulnerability, so this might be a false positive.
* References: https://kb.isc.org/docs/AA-01616 * Platforms Affected: Internet Software Consortium, BIND version 9.12.x < 9.12.2 Any operating system Any version |
Recommendation |
Upgrade to the latest version of BIND(9.12.2 or later), available from the Internet Software Consortium (ISC) Web site at http://www.isc.org/downloads/BIND/ |
Related URL |
CVE-2018-5738 (CVE) |
Related URL |
(SecurityFocus) |
Related URL |
(ISS) |
|