Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.146642
Category:General
Title:ISC BIND Winsock API Vulnerability (CVE-2013-6230) - Windows
Summary:ISC BIND is prone to a vulnerability in the Winsock API.
Description:Summary:
ISC BIND is prone to a vulnerability in the Winsock API.

Vulnerability Insight:
On some Microsoft Windows systems, a network interface that has
an 'all ones' IPv4 subnet mask (255.255.255.255) will be incorrectly reported (by the Winsock
WSAIoctl API) as an all zeroes value (0.0.0.0). Because interfaces' netmasks are used to compute
the broadcast domain for each interface during construction of the built-in 'localnets' ACL, an
all zeroes netmask can cause matches on any IPv4 address, permitting unexpected access to any
BIND feature configured to allow access to 'localnets'. And unless overridden by a specific value
in named.conf, the default permissions for several BIND features (for example, allow-query-cache,
allow-query-cache-on, allow-recursion, and others) use this predefined 'localnets' ACL.

In addition, non-default access controls and other directives using an address match list with
the predefined 'localnets' ACL may not match as expected. This may include rndc 'controls',
'allow-notify', 'allow-query', 'allow-transfer', 'allow-update', 'blackhole', 'filter-aaaa',
'deny-answer-addresses', 'exempt-clients', and other directives if an administrator has specified
the 'localnets' ACL in their match lists.

Vulnerability Impact:
Under this defect, access controls and other directives which
use 'localnets' as part of the address match list may match much more broadly than was intended
by the server administrator. Please note that in addition to configuration statements where the
'localnets' acl is used explicitly, 'localnets' may also be used in the default behavior for some
features (such as 'allow-recursion') unless specifically overridden in the configuration file.
Allowing recursion to all reachable IPv4 addresses entails a number of risks, including increased
exposure to cache poisoning and the possibility of being used in a reflection attack.

Affected Software/OS:
BIND 9.6-ESV through 9.6-ESV-R10, 9.8.0 through 9.8.6, 9.9.0
through 9.9.4, 9.9.3-S1 and 9.9.4-S1 on Windows.

Solution:
Update to version 9.6-ESV-R10-P1, 9.8.6-P1, 9.9.4-P1 or later.

CVSS Score:
6.8

CVSS Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2013-6230
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2014&m=slackware-security.518391
CopyrightCopyright (C) 2021 Greenbone Networks GmbH

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.