Vulnerabilities > CVE-2008-4163 - Unspecified vulnerability in ISC Bind 9.3.5/9.4.2/9.5.0

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN
isc
nessus

Summary

Unspecified vulnerability in ISC BIND 9.3.5-P2-W1, 9.4.2-P2-W1, and 9.5.0-P2-W1 on Windows allows remote attackers to cause a denial of service (UDP client handler termination) via unknown vectors.

Vulnerable Configurations

Part Description Count
Application
Isc
3

Nessus

NASL familyDNS
NASL idBIND_9_5_0_P2_W2.NASL
descriptionAccording to its version number, the remote installation of BIND suffers from a vulnerability in which the UDP client handler can be shutdown, which in turn causes the server to stop responding to UDP queries. Note that this issue only exists in the Windows code of BIND 9.5.0-P2-W1 / 9.4.2-P2-W1 / 9.3.5-P2-W1.
last seen2020-06-01
modified2020-06-02
plugin id34245
published2008-09-20
reporterThis script is Copyright (C) 2008-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/34245
titleISC BIND 9 for Windows UDP Client Handler Remote DoS
code
#
# (C) Tenable Network Security, Inc.
#


include("compat.inc");

if (description)
{
  script_id(34245);
  script_version("1.15");
  script_cvs_date("Date: 2018/11/15 20:50:21");

  script_cve_id("CVE-2008-4163");
  script_bugtraq_id(31252);

  script_name(english:"ISC BIND 9 for Windows UDP Client Handler Remote DoS");
  script_summary(english:"Checks version of BIND");

  script_set_attribute(attribute:"synopsis", value:
"The remote name server is affected by a denial of service
vulnerability." );
  script_set_attribute(attribute:"description", value:
"According to its version number, the remote installation of BIND
suffers from a vulnerability in which the UDP client handler can be
shutdown, which in turn causes the server to stop responding to UDP
queries. 

Note that this issue only exists in the Windows code of BIND
9.5.0-P2-W1 / 9.4.2-P2-W1 / 9.3.5-P2-W1." );
  script_set_attribute(attribute:"see_also", value:"https://marc.info/?l=bind-users&m=122063620115891&w=2" );
  script_set_attribute(attribute:"see_also", value:"https://marc.info/?l=bind-users&m=122169697502216&w=2" );
  script_set_attribute(attribute:"see_also", value:"https://marc.info/?l=bind-announce&m=122180376630150&w=2" );
  script_set_attribute(attribute:"see_also", value:"https://marc.info/?l=bind-announce&m=122180244228378&w=2" );
  script_set_attribute(attribute:"see_also", value:"https://marc.info/?l=bind-announce&m=122180244228376&w=2" );
  script_set_attribute(attribute:"solution", value:
"Upgrade to BIND 9.5.0-P2-W2 / 9.4.2-P2-W2 / 9.3.5-P2-W2 or later." );
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");
  script_cwe_id(20);
  script_set_attribute(attribute:"plugin_publication_date", value: "2008/09/20");
  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:isc:bind");
  script_end_attributes();
 
  script_category(ACT_GATHER_INFO);
  script_family(english: "DNS");
  script_copyright(english:"This script is Copyright (C) 2008-2018 Tenable Network Security, Inc.");
  script_dependencies("bind_version.nasl", "os_fingerprint.nasl");
  script_require_keys("bind/version");

  exit(0);
}


include("global_settings.inc");


os = get_kb_item("Host/OS");
if (!os || "Windows" >!< os) exit(0);


ver = get_kb_item("bind/version");
if (ver && ver =~ "^9\.(3\.5|4\.2|5\.0)-P2-W1($|[^0-9])") 
  security_warning(port:53, proto:"udp");

Statements

contributorJoshua Bressers
lastmodified2017-08-07
organizationRed Hat
statementNot vulnerable. This flaw does not affect the version of BIND as shipped in Red Hat Enterprise Linux 2.1, 3, 4, or 5.