Lucene search

K
centosCentOS ProjectCESA-2013:1115
HistoryJul 30, 2013 - 4:50 a.m.

bind97 security update

2013-07-3004:50:14
CentOS Project
lists.centos.org
61

7.8 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

0.953 High

EPSS

Percentile

99.4%

CentOS Errata and Security Advisory CESA-2013:1115

The Berkeley Internet Name Domain (BIND) is an implementation of the
Domain Name System (DNS) protocols. BIND includes a DNS server (named); a
resolver library (routines for applications to use when interfacing with
DNS); and tools for verifying that the DNS server is operating correctly.

A denial of service flaw was found in BIND. A remote attacker could use
this flaw to send a specially-crafted DNS query to named that, when
processed, would cause named to crash when rejecting the malformed query.
(CVE-2013-4854)

All bind97 users are advised to upgrade to these updated packages, which
contain a backported patch to correct this issue. After installing the
update, the BIND daemon (named) will be restarted automatically.

Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2013-July/082042.html

Affected packages:
bind97
bind97-chroot
bind97-devel
bind97-libs
bind97-utils

Upstream details at:
https://access.redhat.com/errata/RHSA-2013:1115

7.8 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

0.953 High

EPSS

Percentile

99.4%