Lucene search

K

ISC BIND RTYPE ANY Query Denial of Service Vulnerability - Windows

🗓️ 16 Jan 2017 00:00:00Reported by Copyright (C) 2017 Greenbone AGType 
openvas
 openvas
🔗 plugins.openvas.org👁 33 Views

ISC BIND RTYPE ANY Query Denial of Service Vulnerability - Windows. Denial of Service vulnerability in ISC BIND due to error in processing malformed query response to RTYPE ANY query. Successful exploitation allows remote attackers to cause denial of service. Affected versions: 9.4.0 - 9.6-ESV-R11-W1, 9.8.5 - 9.8.8, 9.9.3 - 9.9.9-P4, 9.9.9-S1 - 9.9.9-S6, 9.10.0 - 9.10.4-P4, 9.11.0 - 9.11.0-P1. Update to ISC BIND version 9.9.9-P5, 9.10.4-P5, 9.11.0-P2, 9.9.9-S7 or later

Show more
Related
Refs
Code
ReporterTitlePublishedViews
Family
Check Point Advisories
ISC BIND TKEY Query Response Assertion Failure Denial of Service (CVE-2016-9131)
22 Jan 201700:00
checkpoint_advisories
OSV
CVE-2016-9131
12 Jan 201706:59
osv
OSV
CGA-g9xq-xfgr-hc55
6 Jun 202412:27
osv
OSV
bind9 - security update
29 Jan 201700:00
osv
OSV
bind9 - security update
11 Jan 201700:00
osv
OSV
Red Hat Security Advisory: bind security update
15 Sep 202423:56
osv
OSV
Red Hat Security Advisory: bind security and bug fix update
16 Sep 202400:19
osv
OSV
bind-9.16.20-1.4 on GA media
15 Jun 202400:00
osv
Tenable Nessus
AIX 5.3 TL 12 : bind (IV93366) (deprecated)
8 Mar 201700:00
nessus
Tenable Nessus
AIX 7.2 TL 0 : bind (IV93403) (deprecated)
8 Mar 201700:00
nessus
Rows per page
# SPDX-FileCopyrightText: 2017 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

CPE = "cpe:/a:isc:bind";

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.810288");
  script_version("2023-07-25T05:05:58+0000");
  script_cve_id("CVE-2016-9131");
  script_tag(name:"cvss_base", value:"5.0");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:N/I:N/A:P");
  script_tag(name:"last_modification", value:"2023-07-25 05:05:58 +0000 (Tue, 25 Jul 2023)");
  script_tag(name:"severity_vector", value:"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H");
  script_tag(name:"severity_origin", value:"NVD");
  script_tag(name:"severity_date", value:"2020-08-19 19:17:00 +0000 (Wed, 19 Aug 2020)");
  script_tag(name:"creation_date", value:"2017-01-16 16:59:09 +0530 (Mon, 16 Jan 2017)");
  script_tag(name:"qod_type", value:"remote_banner");
  script_name("ISC BIND RTYPE ANY Query Denial of Service Vulnerability - Windows");

  script_tag(name:"summary", value:"ISC BIND is prone to a denial of service vulnerability.");

  script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");

  script_tag(name:"insight", value:"The flaw exists due to an error in the processing
  of a malformed query response received in response to a RTYPE ANY query.");

  script_tag(name:"impact", value:"Successful exploitation will allow remote
  attackers to cause a denial of service (assertion failure and daemon exit) via
  crafted data.");

  script_tag(name:"affected", value:"ISC BIND versions 9.4.0 through 9.6-ESV-R11-W1,
  9.8.5 through 9.8.8, 9.9.3 through 9.9.9-P4, 9.9.9-S1 through 9.9.9-S6, 9.10.0 through
  9.10.4-P4  and 9.11.0 through 9.11.0-P1.");

  script_tag(name:"solution", value:"Update to ISC BIND version 9.9.9-P5 or
  9.10.4-P5 or 9.11.0-P2 or 9.9.9-S7 or later.");

  script_tag(name:"solution_type", value:"VendorFix");

  script_xref(name:"URL", value:"https://kb.isc.org/docs/aa-01439");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/95386");

  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (C) 2017 Greenbone AG");
  script_family("Denial of Service");
  script_dependencies("gb_isc_bind_consolidation.nasl", "os_detection.nasl");
  script_mandatory_keys("isc/bind/detected", "Host/runs_windows");
  exit(0);
}

include("version_func.inc");
include("host_details.inc");
include("revisions-lib.inc");

if(isnull(port = get_app_port(cpe: CPE)))
  exit(0);

if(!infos = get_app_full(cpe:CPE, port:port, exit_no_version:TRUE))
  exit(0);

version = infos["version"];
proto = infos["proto"];
location = infos["location"];

if(version =~ "^9\.") {
  if (version =~ "^9\.9\.[3-9]") {
    if(revcomp(a: version, b: "9.9.9p5") < 0)
    {
      fix = "9.9.9-P5";
      VULN = TRUE;
    }
  }
  else if(version =~ "^9\.9\.9s[1-6]") {
    fix = "9.9.9-S7";
    VULN = TRUE;
  }

  else if(version =~ "^9\.10\.") {
    if(revcomp(a: version, b: "9.10.4p5") < 0)
    {
      fix = "9.10.4-P5";
      VULN = TRUE;
    }
  }
  else if(version =~ "^9\.11\.0") {
    if(revcomp(a: version, b: "9.11.0p2") < 0)
    {
      fix = "9.11.0-P2";
      VULN = TRUE;
    }
  }
  else if(version_in_range(version:version, test_version:"9.8.5", test_version2:"9.8.8")) {
    fix = "9.9.9-P5";
    VULN = TRUE;
  }
  else if((revcomp(a: version, b: "9.4.0") >= 0) && (revcomp(a: version, b: "9.6r11_w2") < 0)) {
    fix = "9.9.9-P5";
    VULN = TRUE;
  }
}

if(VULN) {
  report = report_fixed_ver(installed_version:version, fixed_version:fix, install_path: location);
  security_message(data:report, port:port, proto:proto);
  exit(0);
}

exit(99);

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
16 Jan 2017 00:00Current
7.5High risk
Vulners AI Score7.5
CVSS25
CVSS37.5
EPSS0.651
33
.json
Report