Lucene search

K
centosCentOS ProjectCESA-2014:1984
HistoryDec 12, 2014 - 11:07 a.m.

bind, caching security update

2014-12-1211:07:42
CentOS Project
lists.centos.org
54

7.8 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

0.898 High

EPSS

Percentile

98.7%

CentOS Errata and Security Advisory CESA-2014:1984

The Berkeley Internet Name Domain (BIND) is an implementation of the Domain
Name System (DNS) protocols. BIND includes a DNS server (named); a resolver
library (routines for applications to use when interfacing with DNS); and
tools for verifying that the DNS server is operating correctly.

A denial of service flaw was found in the way BIND followed DNS
delegations. A remote attacker could use a specially crafted zone
containing a large number of referrals which, when looked up and processed,
would cause named to use excessive amounts of memory or crash.
(CVE-2014-8500)

All bind users are advised to upgrade to these updated packages, which
contain a backported patch to correct this issue. After installing the
update, the BIND daemon (named) will be restarted automatically.

Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2014-December/082989.html
https://lists.centos.org/pipermail/centos-announce/2014-December/082990.html
https://lists.centos.org/pipermail/centos-announce/2014-December/082991.html

Affected packages:
bind
bind-chroot
bind-devel
bind-libbind-devel
bind-libs
bind-libs-lite
bind-license
bind-lite-devel
bind-sdb
bind-sdb-chroot
bind-utils
caching-nameserver

Upstream details at:
https://access.redhat.com/errata/RHSA-2014:1984

7.8 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

0.898 High

EPSS

Percentile

98.7%