info: name: BIND DNS Version - Security Patch Check author: songyaeji severity: high description:> Older versions of the BIND DNS server may contain vulnerabilities such as Service Denial Attacks, Buffer Overflows, and remote code execution risks. This template checks if the BIND service (named) is running and retrieves its version to determine whether security patches have been applied. reference: - https://isms.kisa.or.kr - Cloud Vulnerability Assessment Guide(2024) by KISA tags: linux,dns,bind,patch,misconfiguration,local metadata: verified:true os: linux max-request:2 classification: cvss-metrics: CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score:7.8 cwe-id: CWE-1104