[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247621

 
 

909

 
 

194512

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-3854-1 bind9 -- bind9

ID: oval:org.secpod.oval:def:602877Date: (C)2017-05-17   (M)2023-12-20
Class: PATCHFamily: unix




Several vulnerabilities were discovered in BIND, a DNS server implementation. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2017-3136 Oleg Gorokhov of Yandex discovered that BIND does not properly handle certain queries when using DNS64 with the "break-dnssec yes;" option, allowing a remote attacker to cause a denial-of-service. CVE-2017-3137 It was discovered that BIND makes incorrect assumptions about the ordering of records in the answer section of a response containing CNAME or DNAME resource records, leading to situations where BIND exits with an assertion failure. An attacker can take advantage of this condition to cause a denial-of-service. CVE-2017-3138 Mike Lalumiere of Dyn, Inc. discovered that BIND can exit with a REQUIRE assertion failure if it receives a null command string on its control channel. Note that the fix applied in Debian is only applied as a hardening measure. Details about the issue can be found at https://kb.isc.org/article/AA-01471 .

Platform:
Debian 8.x
Product:
bind9
Reference:
DSA-3854-1
CVE-2017-3136
CVE-2017-3137
CVE-2017-3138
CVE    3
CVE-2017-3138
CVE-2017-3137
CVE-2017-3136
CPE    2
cpe:/a:isc:bind9
cpe:/o:debian:debian_linux:8.x

© SecPod Technologies