[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

244411

 
 

909

 
 

193363

 
 

277

Paid content will be excluded from the download.


Download | Alert*
OVAL

RHSA-2017:1095-01 -- Redhat bind

ID: oval:org.secpod.oval:def:502021Date: (C)2017-04-20   (M)2023-12-20
Class: PATCHFamily: unix




The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. Security Fix: * A denial of service flaw was found in the way BIND handled a query response containing CNAME or DNAME resource records in an unusual order. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS response. * A denial of service flaw was found in the way BIND handled query requests when using DNS64 with "break-dnssec yes" option. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS request. Red Hat would like to thank ISC for reporting these issues. Upstream acknowledges Oleg Gorokhov as the original reporter of CVE-2017-3136.

Platform:
Red Hat Enterprise Linux 7
Product:
bind
Reference:
RHSA-2017:1095-01
CVE-2017-3136
CVE-2017-3137
CVE    2
CVE-2017-3137
CVE-2017-3136
CPE    2
cpe:/o:redhat:enterprise_linux:7
cpe:/a:isc:bind

© SecPod Technologies