Lucene search

K
centosCentOS ProjectCESA-2010:1000
HistoryJan 27, 2011 - 9:19 a.m.

bind security update

2011-01-2709:19:06
CentOS Project
lists.centos.org
51

4 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:N/I:N/A:P

0.014 Low

EPSS

Percentile

86.1%

CentOS Errata and Security Advisory CESA-2010:1000

The Berkeley Internet Name Domain (BIND) is an implementation of the Domain
Name System (DNS) protocols. BIND includes a DNS server (named); a resolver
library (routines for applications to use when interfacing with DNS); and
tools for verifying that the DNS server is operating correctly.

It was discovered that named did not invalidate previously cached SIG
records when adding an NCACHE record for the same entry to the cache. A
remote attacker allowed to send recursive DNS queries to named could use
this flaw to crash named. (CVE-2010-3613)

All BIND users are advised to upgrade to these updated packages, which
contain a backported patch to resolve this issue. After installing the
update, the BIND daemon (named) will be restarted automatically.

Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2011-January/079401.html
https://lists.centos.org/pipermail/centos-announce/2011-January/079402.html

Affected packages:
bind
bind-chroot
bind-devel
bind-libs
bind-utils

Upstream details at:
https://access.redhat.com/errata/RHSA-2010:1000

4 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:N/I:N/A:P

0.014 Low

EPSS

Percentile

86.1%