GLSA Advocate

Joined: 12 May 2004 Posts: 2663
|
Posted: Mon Sep 24, 2012 1:26 am Post subject: [ GLSA 201209-04 ] BIND: Multiple vulnerabilities |
|
|
Gentoo Linux Security Advisory
Title: BIND: Multiple vulnerabilities (GLSA 201209-04)
Severity: normal
Exploitable: remote
Date: September 24, 2012
Bug(s): #402661, #419637, #427966, #434876
ID: 201209-04
Synopsis
Multiple vulnerabilities have been found in BIND, the worst of
which may allow remote Denial of Service.
Background
BIND is the Berkeley Internet Name Domain Server.
Affected Packages
Package: net-dns/bind
Vulnerable: < 9.9.1_p3
Unaffected: >= 9.9.1_p3
Architectures: All supported architectures
Description
Multiple vulnerabilities have been discovered in BIND: - Domain names are not properly revoked due to an error in the cache
update policy (CVE-2012-1033).
- BIND accepts records with zero-length RDATA fields (CVE-2012-1667).
- An assertion failure from the failing-query cache could occur when
DNSSEC validation is enabled (CVE-2012-3817).
- A memory leak may occur under high TCP query loads (CVE-2012-3868).
- An assertion error can occur when a query is performed for a record
with RDATA greater than 65535 bytes (CVE-2012-4244).
Impact
A remote attacker may be able to cause a Denial of Service condition or
keep domain names resolvable after it has been deleted from registration.
Workaround
There is no known workaround at this time.
Resolution
All BIND users should upgrade to the latest version: Code: | # emerge --sync
# emerge --ask --oneshot --verbose ">=net-dns/bind-9.9.1_p3"
|
References
CVE-2012-1033
CVE-2012-1667
CVE-2012-3817
CVE-2012-3868
CVE-2012-4244
Last edited by GLSA on Tue Sep 03, 2013 4:30 am; edited 2 times in total |
|