Lucene search

K
openvasCopyright (C) 2010 Greenbone AGOPENVAS:1361412562310100831
HistorySep 30, 2010 - 12:00 a.m.

ISC BIND Denial Of Service and Security Bypass Vulnerability

2010-09-3000:00:00
Copyright (C) 2010 Greenbone AG
plugins.openvas.org
13

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

AI Score

6.1

Confidence

Low

EPSS

0.054

Percentile

93.2%

ISC BIND is prone to a security-bypass vulnerability and a denial-of-
service vulnerability.

# SPDX-FileCopyrightText: 2010 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

CPE = "cpe:/a:isc:bind";

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.100831");
  script_version("2023-07-28T16:09:07+0000");
  script_tag(name:"last_modification", value:"2023-07-28 16:09:07 +0000 (Fri, 28 Jul 2023)");
  script_tag(name:"creation_date", value:"2010-09-30 13:18:50 +0200 (Thu, 30 Sep 2010)");
  script_tag(name:"cvss_base", value:"5.0");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:P/I:N/A:N");
  script_cve_id("CVE-2010-0218", "CVE-2010-3762");
  script_name("ISC BIND Denial Of Service and Security Bypass Vulnerability");
  script_category(ACT_GATHER_INFO);
  script_family("Denial of Service");
  script_copyright("Copyright (C) 2010 Greenbone AG");
  script_dependencies("gb_isc_bind_consolidation.nasl");
  script_mandatory_keys("isc/bind/detected");

  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/43573");
  script_xref(name:"URL", value:"http://ftp.isc.org/isc/bind9/9.7.2-P2/RELEASE-NOTES-BIND-9.7.2-P2.html");
  script_xref(name:"URL", value:"https://lists.isc.org/pipermail/bind-announce/2010-September/000655.html");

  script_tag(name:"solution", value:"Vendor updates are available. Please see the references for more
  information.");

  script_tag(name:"summary", value:"ISC BIND is prone to a security-bypass vulnerability and a denial-of-
  service vulnerability.");

  script_tag(name:"impact", value:"Successfully exploiting these issues allows remote attackers to crash
  affected DNS servers, denying further service to legitimate users, bypass certain security restrictions
  and perform unauthorized actions. Other attacks are also possible.");

  script_tag(name:"affected", value:"ISC BIND versions 9.7.2 through 9.7.2-P1 are vulnerable.");

  script_tag(name:"qod_type", value:"remote_banner_unreliable");
  script_tag(name:"solution_type", value:"VendorFix");

  exit(0);
}

include("version_func.inc");
include("host_details.inc");

if( isnull( port = get_app_port( cpe:CPE ) ) )
  exit( 0 );

if( ! infos = get_app_full( cpe:CPE, port:port, exit_no_version:TRUE ) )
  exit( 0 );

version = infos["version"];
proto = infos["proto"];
location = infos["location"];

if( version =~ "^9\.7\.2" ) {
  if( version_is_less( version:version, test_version:"9.7.2p2" ) ) {
    report = report_fixed_ver( installed_version:version, fixed_version:"9.7.2-P2", install_path: location );
    security_message( data:report, port:port, proto:proto );
    exit( 0 );
  }
}

exit( 99 );

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

AI Score

6.1

Confidence

Low

EPSS

0.054

Percentile

93.2%