Joined: 12 May 2004
|Posted: Mon Sep 24, 2012 1:26 am Post subject: [ GLSA 201209-04 ] BIND: Multiple vulnerabilities
|Gentoo Linux Security Advisory
Title: BIND: Multiple vulnerabilities (GLSA 201209-04)
Date: September 24, 2012
Bug(s): #402661, #419637, #427966, #434876
Multiple vulnerabilities have been found in BIND, the worst of
which may allow remote Denial of Service.
BIND is the Berkeley Internet Name Domain Server.
Vulnerable: < 9.9.1_p3
Unaffected: >= 9.9.1_p3
Architectures: All supported architectures
Multiple vulnerabilities have been discovered in BIND:
- Domain names are not properly revoked due to an error in the cache
update policy (CVE-2012-1033).
- BIND accepts records with zero-length RDATA fields (CVE-2012-1667).
- An assertion failure from the failing-query cache could occur when
DNSSEC validation is enabled (CVE-2012-3817).
- A memory leak may occur under high TCP query loads (CVE-2012-3868).
- An assertion error can occur when a query is performed for a record
with RDATA greater than 65535 bytes (CVE-2012-4244).
A remote attacker may be able to cause a Denial of Service condition or
keep domain names resolvable after it has been deleted from registration.
There is no known workaround at this time.
All BIND users should upgrade to the latest version:
|# emerge --sync
# emerge --ask --oneshot --verbose ">=net-dns/bind-9.9.1_p3"
Last edited by GLSA on Tue Sep 03, 2013 4:30 am; edited 2 times in total