|
|
Subscribe / Log in / New account

bind: denial of service

Package(s):bind CVE #(s):CVE-2015-4620
Created:July 8, 2015 Updated:August 3, 2015
Description: From the Arch Linux advisory:

A very uncommon combination of zone data has been found that triggers a bug in BIND, with the result that named will exit with a "REQUIRE" failure in name.c when validating the data returned in answer to a recursive query.

This means that a recursive resolver that is performing DNSSEC validation can be deliberately stopped by an attacker who can cause the resolver to perform a query against a maliciously-constructed zone.

A remote attacker can crash a bind resolver performing DNSSEC validation by querying it for a specially crafted zone.

Alerts:
Gentoo 201510-01 bind 2015-10-18
Scientific Linux SLSA-2015:1471-1 bind 2015-08-03
openSUSE openSUSE-SU-2015:1326-1 bind 2015-07-31
Oracle ELSA-2015-1471 bind 2015-07-29
Red Hat RHSA-2015:1471-01 bind 2015-07-22
Scientific Linux SLSA-2015:1443-1 bind 2015-07-20
Oracle ELSA-2015-1443 bind 2015-07-20
Fedora FEDORA-2015-11484 bind 2015-07-21
CentOS CESA-2015:1443 bind 2015-07-20
Red Hat RHSA-2015:1443-01 bind 2015-07-20
Fedora FEDORA-2015-11483 bind 2015-07-18
openSUSE openSUSE-SU-2015:1250-2 bind 2015-07-16
openSUSE openSUSE-SU-2015:1250-1 bind 2015-07-16
Debian-LTS DLA-270-1 bind9 2015-07-11
Mageia MGASA-2015-0272 bind 2015-07-09
Ubuntu USN-2669-1 bind9 2015-07-07
SUSE SUSE-SU-2015:1205-1 bind 2015-07-08
Slackware SSA:2015-188-04 bind 2015-07-07
Debian DSA-3304-1 bind9 2015-07-07
Arch Linux ASA-201507-6 bind 2015-07-07

to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds