Lucene search

K
archlinuxArch LinuxASA-201509-2
HistorySep 03, 2015 - 12:00 a.m.

bind: denial of service

2015-09-0300:00:00
Arch Linux
lists.archlinux.org
24

7.8 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

0.966 High

EPSS

Percentile

99.5%

  • CVE-2015-5722 (Parsing malformed keys may cause BIND to exit due to a
    failed assertion in buffer.c):

Parsing a malformed DNSSEC key can cause a validating resolver to exit
due to a failed assertion in buffer.c. It is possible for a remote
attacker to deliberately trigger this condition, for example by using a
query which requires a response from a zone containing a deliberately
malformed key.

  • CVE-2015-5986 (An incorrect boundary check can trigger a REQUIRE
    assertion failure in openpgpkey_61.c):

An incorrect boundary check in openpgpkey_61.c can cause named to
terminate due to a REQUIRE assertion failure. This defect can be
deliberately exploited by an attacker who can provide a maliciously
constructed response in answer to a query.

OSVersionArchitecturePackageVersionFilename
anyanyanybind< 9.10.2.P4-1UNKNOWN

7.8 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

0.966 High

EPSS

Percentile

99.5%