Rapid7 Vulnerability & Exploit Database

RHSA-2014:1244: bind97 security and bug fix update

Back to Search

RHSA-2014:1244: bind97 security and bug fix update



The Berkeley Internet Name Domain (BIND) is an implementation of the DomainName System (DNS) protocols. It contains a DNS server (named), a resolverlibrary with routines for applications to use when interfacing with DNS,and tools for verifying that the DNS server is operating correctly.These packages contain version 9.7 of the BIND suite.A denial of service flaw was found in the way BIND handled queries forNSEC3-signed zones. A remote attacker could use this flaw against anauthoritative name server that served NCES3-signed zones by sending aspecially crafted query, which, when processed, would cause named to crash.(CVE-2014-0591)Note: The CVE-2014-0591 issue does not directly affect the version ofbind97 shipped in Red Hat Enterprise Linux 5. This issue is being addressedhowever to assure it is not introduced in future builds of bind97 (possiblybuilt with a different compiler or C library optimization).This update also fixes the following bug:All bind97 users are advised to upgrade to these updated packages, whichcontain backported patches to correct these issues. After installing theupdate, the BIND daemon (named) will be restarted automatically.


  • redhat-upgrade-bind97
  • redhat-upgrade-bind97-chroot
  • redhat-upgrade-bind97-debuginfo
  • redhat-upgrade-bind97-devel
  • redhat-upgrade-bind97-libs
  • redhat-upgrade-bind97-utils

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center