Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> General >> Usable remote name server


Vulnerability Assessment Details

Usable remote name server

Vulnerability Assessment Summary
Acertains if the remote name server allows recursive queries

Detailed Explanation for this Vulnerability Assessment

Summary :

The remote name server permits recursive queries to be performed
by the host running nessusd.


Description :

It is possible to query the remote name server for third party names.

If this is your internal nameserver, then forget this warning.

If you are probing a remote nameserver, then it permits anyone
to use it to resolve third parties names (such as www.nessus.org).
This permits hackers to do cache poisoning attacks against this
nameserver.

If the host permits these recursive queries via UDP,
then the host can be used to 'bounce' Denial of Service attacks
against another network or system.

See also :

http://www.cert.org/advisories/CA-1997-22.html

Solution :

Restrict recursive queries to the hosts that should
use this nameserver (such as those of the LAN connected to it).

If you are using bind 8, you can do this by using the instruction
'permit-recursion' in the 'options' section of your named.conf

If you are using bind 9, you can define a grouping of internal addresses
using the 'acl' command

Then, within the options block, you can explicitly state:
'permit-recursion { hosts_defined_in_acl }'

For more info on Bind 9 administration (to include recursion), see:
http://www.nominum.com/content/documents/bind9arm.pdf

If you are using another name server, consult its documentation.

Network Security Threat Level:

Medium / CVSS Base Score : 4
(AV:R/AC:L/Au:NR/C:N/A:N/I:P/B:I)

Networks Security ID: 136, 678

Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Tenable Network Security

Cables, Connectors


1U BareMetal pfsense opnsense Router Firewall DNS Server 6x 10GB Ethernet Ports picture

1U BareMetal pfsense opnsense Router Firewall DNS Server 6x 10GB Ethernet Ports

$149.00



PFSENSE 15

PFSENSE 15" Depth Server Router Firewall Supermicro X11SSH-F E3-1240 V5 32GB RAM

$382.00



Dell PowerEdge R730xd Server 2.60Ghz 32-Core 64GB 800GB SSD Debian Linux picture

Dell PowerEdge R730xd Server 2.60Ghz 32-Core 64GB 800GB SSD Debian Linux

$836.80



1U Open Source Router Firewall X10SLH-N6-ST031 E3-1270 V3 6x 10GB Ethernet 16GB picture

1U Open Source Router Firewall X10SLH-N6-ST031 E3-1270 V3 6x 10GB Ethernet 16GB

$419.00



Open Eye OE-MTX08 8TB Micro Server With Linux (Boots To Login) No Accessories  picture

Open Eye OE-MTX08 8TB Micro Server With Linux (Boots To Login) No Accessories

$294.95



TunnelBear VPN / 1 Year picture

TunnelBear VPN / 1 Year

$5.49



Red Hat Enterprise Linux 5 Server - New and Sealed picture

Red Hat Enterprise Linux 5 Server - New and Sealed

$16.99



IBM CS821 20-Core 2.827GHz 128Gb 1.92Tb SSD 1U Linux Server - 8005-12N Power 8 picture

IBM CS821 20-Core 2.827GHz 128Gb 1.92Tb SSD 1U Linux Server - 8005-12N Power 8

$599.95



VPS Windows / Linux Server - 12GB  RAM, 4 Core, 1 TB HD, Unltd. bandwidth 1 Year picture

VPS Windows / Linux Server - 12GB RAM, 4 Core, 1 TB HD, Unltd. bandwidth 1 Year

$277.62



8x 240GB SSD 1U Rackmount Deduplication Compression Backup RAID Server X10DRW-iT picture

8x 240GB SSD 1U Rackmount Deduplication Compression Backup RAID Server X10DRW-iT

$499.00



Discussions

No Discussions have been posted on this vulnerability.