[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247621

 
 

909

 
 

194512

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

CESA-2017:1095 -- centos 7 bind

ID: oval:org.secpod.oval:def:204479Date: (C)2017-04-20   (M)2022-10-10
Class: PATCHFamily: unix




The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. Security Fix: * A denial of service flaw was found in the way BIND handled a query response containing CNAME or DNAME resource records in an unusual order. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS response. * A denial of service flaw was found in the way BIND handled query requests when using DNS64 with "break-dnssec yes" option. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS request. Red Hat would like to thank ISC for reporting these issues. Upstream acknowledges Oleg Gorokhov as the original reporter of CVE-2017-3136.

Platform:
CentOS 7
Product:
bind
Reference:
CESA-2017:1095
CVE-2017-3136
CVE-2017-3137
CVE    2
CVE-2017-3137
CVE-2017-3136
CPE    2
cpe:/a:isc:bind
cpe:/o:centos:centos:7

© SecPod Technologies