Lucene search

K
openvasCopyright (C) 2023 Greenbone Networks GmbHOPENVAS:1361412562310124238
HistoryJan 03, 2023 - 12:00 a.m.

ISC BIND DoS Vulnerability (CVE-2012-5689) - Linux

2023-01-0300:00:00
Copyright (C) 2023 Greenbone Networks GmbH
plugins.openvas.org
11
isc bind
denial of service
vulnerability
linux
cve-2012-5689
dns64
remote attack
assertion failure
named daemon exit
aaaa record
update required
information security document

CVSS2

7.1

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:N/I:N/A:C

AI Score

6.3

Confidence

Low

EPSS

0.012

Percentile

84.9%

ISC BIND is prone to a denial of service (DoS) vulnerability.

# Copyright (C) 2023 Greenbone Networks GmbH
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-or-later
#
# This program is free software; you can redistribute it and/or
# modify it under the terms of the GNU General Public License
# as published by the Free Software Foundation; either version 2
# of the License, or (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.

CPE = "cpe:/a:isc:bind";

if (description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.124238");
  script_version("2023-01-24T10:12:05+0000");
  script_tag(name:"last_modification", value:"2023-01-24 10:12:05 +0000 (Tue, 24 Jan 2023)");
  script_tag(name:"creation_date", value:"2023-01-03 10:55:12 +0000 (Tue, 03 Jan 2023)");
  script_tag(name:"cvss_base", value:"7.1");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:N/C:N/I:N/A:C");

  script_cve_id("CVE-2012-5689");

  script_tag(name:"qod_type", value:"remote_banner_unreliable");

  script_tag(name:"solution_type", value:"VendorFix");

  script_name("ISC BIND DoS Vulnerability (CVE-2012-5689) - Linux");

  script_category(ACT_GATHER_INFO);

  script_copyright("Copyright (C) 2023 Greenbone Networks GmbH");
  script_family("Denial of Service");
  script_dependencies("gb_isc_bind_consolidation.nasl", "os_detection.nasl");
  script_mandatory_keys("isc/bind/detected", "Host/runs_unixoide");

  script_tag(name:"summary", value:"ISC BIND is prone to a denial of service (DoS) vulnerability.");

  script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");

  script_tag(name:"insight", value:"ISC BIND, in certain configurations involving DNS64 with a
  Response Policy Zone that lacks an AAAA rewrite rule, allows remote attackers to cause a denial
  of service (assertion failure and named daemon exit) via a query for an AAAA record.");

  script_tag(name:"affected", value:"ISC BIND versions 9.8.0 through 9.8.4-P1, 9.9x through
  9.9.2-P1.");

  script_tag(name:"solution", value:"Update to version 9.8.5, 9.9.3 or later.");

  script_xref(name:"URL", value:"https://kb.isc.org/docs/aa-00855");
  script_xref(name:"URL", value:"https://www.infosecmatter.com/nessus-plugin-library/?id=106136");

  exit(0);
}

include("host_details.inc");
include("version_func.inc");

if (isnull(port = get_app_port(cpe: CPE)))
  exit(0);

if (!infos = get_app_full(cpe: CPE, port: port, exit_no_version: TRUE))
  exit(0);

version = infos["version"];
proto = infos["proto"];
location = infos["location"];

if (version_in_range_exclusive(version: version, test_version_lo: "9.8", test_version_up: "9.8.5")) {
  report = report_fixed_ver(installed_version: version, fixed_version: "9.8.5");
  security_message(port: port, data: report, proto: proto);
  exit(0);
}

if (version_in_range_exclusive(version: version, test_version_lo: "9.9", test_version_up: "9.9.3")) {
  report = report_fixed_ver(installed_version: version, fixed_version: "9.9.3");
  security_message(port: port, data: report, proto: proto);
  exit(0);
}

exit(99);

CVSS2

7.1

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:N/I:N/A:C

AI Score

6.3

Confidence

Low

EPSS

0.012

Percentile

84.9%