Lucene search

K
centosCentOS ProjectCESA-2013:0690
HistoryMar 28, 2013 - 11:25 p.m.

bind97 security update

2013-03-2823:25:41
CentOS Project
lists.centos.org
47

7.8 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

0.943 High

EPSS

Percentile

99.2%

CentOS Errata and Security Advisory CESA-2013:0690

The Berkeley Internet Name Domain (BIND) is an implementation of the
Domain Name System (DNS) protocols. BIND includes a DNS server (named); a
resolver library (routines for applications to use when interfacing with
DNS); and tools for verifying that the DNS server is operating correctly.

A denial of service flaw was found in the libdns library. A remote attacker
could use this flaw to send a specially-crafted DNS query to named that,
when processed, would cause named to use an excessive amount of memory, or
possibly crash. (CVE-2013-2266)

Note: This update disables the syntax checking of NAPTR (Naming Authority
Pointer) resource records.

All bind97 users are advised to upgrade to these updated packages, which
contain a patch to correct this issue. After installing the update, the
BIND daemon (named) will be restarted automatically.

Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2013-March/081833.html

Affected packages:
bind97
bind97-chroot
bind97-devel
bind97-libs
bind97-utils

Upstream details at:
https://access.redhat.com/errata/RHSA-2013:0690

7.8 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

0.943 High

EPSS

Percentile

99.2%