UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The DNS implementation must check the validity of data inputs.


Overview

Finding ID Version Rule ID IA Controls Severity
V-34270 SRG-NET-000312-DNS-000173 SV-44749r1_rule Medium
Description
Invalid input occurs when a user, or system acting on behalf of a user, inserts data or characters into an application's data entry fields and the application is unprepared to process that data. This results in unanticipated application behavior potentially leading to an application or information system compromise. Invalid user input is one of the primary methods employed when attempting to compromise an application. The integrity of the DNS zone data is paramount for network communication. If the DNS zone data were invalid, many networking functions and communication would be adversely affected. Due to the public nature of the DNS service, a combination of security techniques must be utilized to protect the integrity of the DNS data. Validation of input data must be an intrinsic part of the DNS server software.
STIG Date
Domain Name System (DNS) Security Requirements Guide 2012-10-24

Details

Check Text ( C-42254r1_chk )
Review the DNS implementation to determine if data input validation occurs. If no checks on the validity of data input occur, this is a finding.
Fix Text (F-38201r1_fix)
Ensure the DNS implementation checks the validity of data inputs.