Vulnerability & Exploit Database

Back to search

RHSA-2011:1459: bind97 security update

Severity CVSS Published Added Modified
5 (AV:N/AC:L/Au:N/C:N/I:N/A:P) November 29, 2011 December 01, 2011 July 04, 2017


The Berkeley Internet Name Domain (BIND) is an implementation of the DomainName System (DNS) protocols. BIND includes a DNS server (named); a resolverlibrary (routines for applications to use when interfacing with DNS); andtools for verifying that the DNS server is operating correctly.A flaw was discovered in the way BIND handled certain DNS queries, whichcaused it to cache an invalid record. A remote attacker could use thisflaw to send repeated queries for this invalid record, causing theresolvers to exit unexpectedly due to a failed assertion. (CVE-2011-4313)Users of bind97 are advised to upgrade to these updated packages, whichresolve this issue. After installing the update, the BIND daemon (named)will be restarted automatically.

Scan For This Vulnerability

Use our top-rated tool to discover, prioritize, and remediate your vulnerabilities

 Free InsightVM Trial




Related Vulnerabilities