[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

244411

 
 

909

 
 

193363

 
 

277

Paid content will be excluded from the download.


Download | Alert*
OVAL

ELSA-2016-0459 -- Oracle bind

ID: oval:org.secpod.oval:def:1501399Date: (C)2016-05-31   (M)2023-12-07
Class: PATCHFamily: unix




The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. A denial of service flaw was found in the way BIND parsed signature records for DNAME records. By sending a specially crafted query, a remote attacker could use this flaw to cause named to crash. A denial of service flaw was found in the way BIND processed certain control channel input. A remote attacker able to send a malformed packet to the control channel could use this flaw to cause named to crash. Red Hat would like to thank ISC for reporting these issues. All bind users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. After installing the update, the BIND daemon will be restarted automatically.

Platform:
Oracle Linux 6
Product:
bind
Reference:
ELSA-2016-0459
CVE-2016-1285
CVE-2016-1286
CVE    2
CVE-2016-1286
CVE-2016-1285
CPE    331
cpe:/a:isc:bind:9.2.4:rc2
cpe:/a:isc:bind:9.2.4:rc3
cpe:/a:isc:bind:9.3.1:rc1
cpe:/a:isc:bind:9.2.4:rc4
...

© SecPod Technologies