![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.146642 |
Category: | General |
Title: | ISC BIND Winsock API Vulnerability (CVE-2013-6230) - Windows |
Summary: | ISC BIND is prone to a vulnerability in the Winsock API. |
Description: | Summary: ISC BIND is prone to a vulnerability in the Winsock API. Vulnerability Insight: On some Microsoft Windows systems, a network interface that has an 'all ones' IPv4 subnet mask (255.255.255.255) will be incorrectly reported (by the Winsock WSAIoctl API) as an all zeroes value (0.0.0.0). Because interfaces' netmasks are used to compute the broadcast domain for each interface during construction of the built-in 'localnets' ACL, an all zeroes netmask can cause matches on any IPv4 address, permitting unexpected access to any BIND feature configured to allow access to 'localnets'. And unless overridden by a specific value in named.conf, the default permissions for several BIND features (for example, allow-query-cache, allow-query-cache-on, allow-recursion, and others) use this predefined 'localnets' ACL. In addition, non-default access controls and other directives using an address match list with the predefined 'localnets' ACL may not match as expected. This may include rndc 'controls', 'allow-notify', 'allow-query', 'allow-transfer', 'allow-update', 'blackhole', 'filter-aaaa', 'deny-answer-addresses', 'exempt-clients', and other directives if an administrator has specified the 'localnets' ACL in their match lists. Vulnerability Impact: Under this defect, access controls and other directives which use 'localnets' as part of the address match list may match much more broadly than was intended by the server administrator. Please note that in addition to configuration statements where the 'localnets' acl is used explicitly, 'localnets' may also be used in the default behavior for some features (such as 'allow-recursion') unless specifically overridden in the configuration file. Allowing recursion to all reachable IPv4 addresses entails a number of risks, including increased exposure to cache poisoning and the possibility of being used in a reflection attack. Affected Software/OS: BIND 9.6-ESV through 9.6-ESV-R10, 9.8.0 through 9.8.6, 9.9.0 through 9.9.4, 9.9.3-S1 and 9.9.4-S1 on Windows. Solution: Update to version 9.6-ESV-R10-P1, 9.8.6-P1, 9.9.4-P1 or later. CVSS Score: 6.8 CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2013-6230 http://www.slackware.com/security/viewer.php?l=slackware-security&y=2014&m=slackware-security.518391 |
Copyright | Copyright (C) 2021 Greenbone Networks GmbH |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |