Vulnerability & Exploit Database

Back to search

RHSA-2014:1244: bind97 security and bug fix update

Severity CVSS Published Added Modified
3 (AV:N/AC:H/Au:N/C:N/I:N/A:P) January 12, 2014 September 18, 2014 July 03, 2017

Description

The Berkeley Internet Name Domain (BIND) is an implementation of the DomainName System (DNS) protocols. It contains a DNS server (named), a resolverlibrary with routines for applications to use when interfacing with DNS,and tools for verifying that the DNS server is operating correctly.These packages contain version 9.7 of the BIND suite.A denial of service flaw was found in the way BIND handled queries forNSEC3-signed zones. A remote attacker could use this flaw against anauthoritative name server that served NCES3-signed zones by sending aspecially crafted query, which, when processed, would cause named to crash.(CVE-2014-0591)Note: The CVE-2014-0591 issue does not directly affect the version ofbind97 shipped in Red Hat Enterprise Linux 5. This issue is being addressedhowever to assure it is not introduced in future builds of bind97 (possiblybuilt with a different compiler or C library optimization).This update also fixes the following bug:All bind97 users are advised to upgrade to these updated packages, whichcontain backported patches to correct these issues. After installing theupdate, the BIND daemon (named) will be restarted automatically.

Free Nexpose Download

Discover, prioritize, and remediate security risks today!

 Download now

References

Solution

redhat-upgrade-bind97

Related Vulnerabilities