Lucene search

K
nessusThis script is Copyright (C) 2008-2018 Tenable Network Security, Inc.BIND_9_5_0_P2_W2.NASL
HistorySep 20, 2008 - 12:00 a.m.

ISC BIND 9 for Windows UDP Client Handler Remote DoS

2008-09-2000:00:00
This script is Copyright (C) 2008-2018 Tenable Network Security, Inc.
www.tenable.com
12

7.8 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

0.029 Low

EPSS

Percentile

90.8%

According to its version number, the remote installation of BIND suffers from a vulnerability in which the UDP client handler can be shutdown, which in turn causes the server to stop responding to UDP queries.

Note that this issue only exists in the Windows code of BIND 9.5.0-P2-W1 / 9.4.2-P2-W1 / 9.3.5-P2-W1.

#
# (C) Tenable Network Security, Inc.
#


include("compat.inc");

if (description)
{
  script_id(34245);
  script_version("1.15");
  script_cvs_date("Date: 2018/11/15 20:50:21");

  script_cve_id("CVE-2008-4163");
  script_bugtraq_id(31252);

  script_name(english:"ISC BIND 9 for Windows UDP Client Handler Remote DoS");
  script_summary(english:"Checks version of BIND");

  script_set_attribute(attribute:"synopsis", value:
"The remote name server is affected by a denial of service
vulnerability." );
  script_set_attribute(attribute:"description", value:
"According to its version number, the remote installation of BIND
suffers from a vulnerability in which the UDP client handler can be
shutdown, which in turn causes the server to stop responding to UDP
queries. 

Note that this issue only exists in the Windows code of BIND
9.5.0-P2-W1 / 9.4.2-P2-W1 / 9.3.5-P2-W1." );
  script_set_attribute(attribute:"see_also", value:"https://marc.info/?l=bind-users&m=122063620115891&w=2" );
  script_set_attribute(attribute:"see_also", value:"https://marc.info/?l=bind-users&m=122169697502216&w=2" );
  script_set_attribute(attribute:"see_also", value:"https://marc.info/?l=bind-announce&m=122180376630150&w=2" );
  script_set_attribute(attribute:"see_also", value:"https://marc.info/?l=bind-announce&m=122180244228378&w=2" );
  script_set_attribute(attribute:"see_also", value:"https://marc.info/?l=bind-announce&m=122180244228376&w=2" );
  script_set_attribute(attribute:"solution", value:
"Upgrade to BIND 9.5.0-P2-W2 / 9.4.2-P2-W2 / 9.3.5-P2-W2 or later." );
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");
  script_cwe_id(20);
  script_set_attribute(attribute:"plugin_publication_date", value: "2008/09/20");
  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:isc:bind");
  script_end_attributes();
 
  script_category(ACT_GATHER_INFO);
  script_family(english: "DNS");
  script_copyright(english:"This script is Copyright (C) 2008-2018 Tenable Network Security, Inc.");
  script_dependencies("bind_version.nasl", "os_fingerprint.nasl");
  script_require_keys("bind/version");

  exit(0);
}


include("global_settings.inc");


os = get_kb_item("Host/OS");
if (!os || "Windows" >!< os) exit(0);


ver = get_kb_item("bind/version");
if (ver && ver =~ "^9\.(3\.5|4\.2|5\.0)-P2-W1($|[^0-9])") 
  security_warning(port:53, proto:"udp");
VendorProductVersionCPE
iscbindcpe:/a:isc:bind

7.8 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

0.029 Low

EPSS

Percentile

90.8%