ISC BIND RTYPE ANY Query Denial of Service Vulnerability - Windows. Denial of Service vulnerability in ISC BIND due to error in processing malformed query response to RTYPE ANY query. Successful exploitation allows remote attackers to cause denial of service. Affected versions: 9.4.0 - 9.6-ESV-R11-W1, 9.8.5 - 9.8.8, 9.9.3 - 9.9.9-P4, 9.9.9-S1 - 9.9.9-S6, 9.10.0 - 9.10.4-P4, 9.11.0 - 9.11.0-P1. Update to ISC BIND version 9.9.9-P5, 9.10.4-P5, 9.11.0-P2, 9.9.9-S7 or later
Reporter | Title | Published | Views | Family All 97 |
---|---|---|---|---|
Check Point Advisories | ISC BIND TKEY Query Response Assertion Failure Denial of Service (CVE-2016-9131) | 22 Jan 201700:00 | – | checkpoint_advisories |
OSV | CVE-2016-9131 | 12 Jan 201706:59 | – | osv |
OSV | CGA-g9xq-xfgr-hc55 | 6 Jun 202412:27 | – | osv |
OSV | bind9 - security update | 29 Jan 201700:00 | – | osv |
OSV | bind9 - security update | 11 Jan 201700:00 | – | osv |
OSV | Red Hat Security Advisory: bind security update | 15 Sep 202423:56 | – | osv |
OSV | Red Hat Security Advisory: bind security and bug fix update | 16 Sep 202400:19 | – | osv |
OSV | bind-9.16.20-1.4 on GA media | 15 Jun 202400:00 | – | osv |
Tenable Nessus | AIX 5.3 TL 12 : bind (IV93366) (deprecated) | 8 Mar 201700:00 | – | nessus |
Tenable Nessus | AIX 7.2 TL 0 : bind (IV93403) (deprecated) | 8 Mar 201700:00 | – | nessus |
Source | Link |
---|---|
kb | www.kb.isc.org/docs/aa-01439 |
securityfocus | www.securityfocus.com/bid/95386 |
# SPDX-FileCopyrightText: 2017 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
CPE = "cpe:/a:isc:bind";
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.0.810288");
script_version("2023-07-25T05:05:58+0000");
script_cve_id("CVE-2016-9131");
script_tag(name:"cvss_base", value:"5.0");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:N/I:N/A:P");
script_tag(name:"last_modification", value:"2023-07-25 05:05:58 +0000 (Tue, 25 Jul 2023)");
script_tag(name:"severity_vector", value:"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H");
script_tag(name:"severity_origin", value:"NVD");
script_tag(name:"severity_date", value:"2020-08-19 19:17:00 +0000 (Wed, 19 Aug 2020)");
script_tag(name:"creation_date", value:"2017-01-16 16:59:09 +0530 (Mon, 16 Jan 2017)");
script_tag(name:"qod_type", value:"remote_banner");
script_name("ISC BIND RTYPE ANY Query Denial of Service Vulnerability - Windows");
script_tag(name:"summary", value:"ISC BIND is prone to a denial of service vulnerability.");
script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");
script_tag(name:"insight", value:"The flaw exists due to an error in the processing
of a malformed query response received in response to a RTYPE ANY query.");
script_tag(name:"impact", value:"Successful exploitation will allow remote
attackers to cause a denial of service (assertion failure and daemon exit) via
crafted data.");
script_tag(name:"affected", value:"ISC BIND versions 9.4.0 through 9.6-ESV-R11-W1,
9.8.5 through 9.8.8, 9.9.3 through 9.9.9-P4, 9.9.9-S1 through 9.9.9-S6, 9.10.0 through
9.10.4-P4 and 9.11.0 through 9.11.0-P1.");
script_tag(name:"solution", value:"Update to ISC BIND version 9.9.9-P5 or
9.10.4-P5 or 9.11.0-P2 or 9.9.9-S7 or later.");
script_tag(name:"solution_type", value:"VendorFix");
script_xref(name:"URL", value:"https://kb.isc.org/docs/aa-01439");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/95386");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2017 Greenbone AG");
script_family("Denial of Service");
script_dependencies("gb_isc_bind_consolidation.nasl", "os_detection.nasl");
script_mandatory_keys("isc/bind/detected", "Host/runs_windows");
exit(0);
}
include("version_func.inc");
include("host_details.inc");
include("revisions-lib.inc");
if(isnull(port = get_app_port(cpe: CPE)))
exit(0);
if(!infos = get_app_full(cpe:CPE, port:port, exit_no_version:TRUE))
exit(0);
version = infos["version"];
proto = infos["proto"];
location = infos["location"];
if(version =~ "^9\.") {
if (version =~ "^9\.9\.[3-9]") {
if(revcomp(a: version, b: "9.9.9p5") < 0)
{
fix = "9.9.9-P5";
VULN = TRUE;
}
}
else if(version =~ "^9\.9\.9s[1-6]") {
fix = "9.9.9-S7";
VULN = TRUE;
}
else if(version =~ "^9\.10\.") {
if(revcomp(a: version, b: "9.10.4p5") < 0)
{
fix = "9.10.4-P5";
VULN = TRUE;
}
}
else if(version =~ "^9\.11\.0") {
if(revcomp(a: version, b: "9.11.0p2") < 0)
{
fix = "9.11.0-P2";
VULN = TRUE;
}
}
else if(version_in_range(version:version, test_version:"9.8.5", test_version2:"9.8.8")) {
fix = "9.9.9-P5";
VULN = TRUE;
}
else if((revcomp(a: version, b: "9.4.0") >= 0) && (revcomp(a: version, b: "9.6r11_w2") < 0)) {
fix = "9.9.9-P5";
VULN = TRUE;
}
}
if(VULN) {
report = report_fixed_ver(installed_version:version, fixed_version:fix, install_path: location);
security_message(data:report, port:port, proto:proto);
exit(0);
}
exit(99);
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo