[Forgot Password]
Login  Register Subscribe

23631

 
 

115038

 
 

96174

 
 

909

 
 

78077

 
 

109

Paid content will be excluded from the download.


Download | Alert*
OVAL

RHSA-2009:1179-02 -- Redhat bind

ID: oval:org.secpod.oval:def:500547Date: (C)2012-01-31   (M)2017-10-04
Class: PATCHFamily: unix




The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. A flaw was found in the way BIND handles dynamic update message packets containing the "ANY" record type. A remote attacker could use this flaw to send a specially-crafted dynamic update packet that could cause named to exit with an assertion failure. Note: even if named is not configured for dynamic updates, receiving such a specially-crafted dynamic update packet could still cause named to exit unexpectedly. All BIND users are advised to upgrade to these updated packages, which contain a backported patch to resolve this issue. After installing the update, the BIND daemon will be restarted automatically.

Platform:
Red Hat Enterprise Linux 5
Product:
bind
Reference:
RHSA-2009:1179-02
CVE-2009-0696
CVE    1
CVE-2009-0696
CPE    67
cpe:/a:isc:bind
cpe:/a:isc:bind:9.4.2
cpe:/a:isc:bind:9.6.0
cpe:/a:isc:bind:9.4.1
...

© 2013 SecPod Technologies