bind: denial of service

ID ASA-201509-2
Type archlinux
Reporter Arch Linux
Modified 2015-09-03T00:00:00


  • CVE-2015-5722 (Parsing malformed keys may cause BIND to exit due to a failed assertion in buffer.c):

Parsing a malformed DNSSEC key can cause a validating resolver to exit due to a failed assertion in buffer.c. It is possible for a remote attacker to deliberately trigger this condition, for example by using a query which requires a response from a zone containing a deliberately malformed key.

  • CVE-2015-5986 (An incorrect boundary check can trigger a REQUIRE assertion failure in openpgpkey_61.c):

An incorrect boundary check in openpgpkey_61.c can cause named to terminate due to a REQUIRE assertion failure. This defect can be deliberately exploited by an attacker who can provide a maliciously constructed response in answer to a query.