6.5 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:L/Au:S/C:N/I:N/A:C
0.958 High
EPSS
Percentile
99.4%
CentOS Errata and Security Advisory CESA-2016:0073
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain
Name System (DNS) protocols. BIND includes a DNS server (named); a resolver
library (routines for applications to use when interfacing with DNS); and
tools for verifying that the DNS server is operating correctly.
A denial of service flaw was found in the way BIND processed certain
malformed Address Prefix List (APL) records. A remote, authenticated
attacker could use this flaw to cause named to crash. (CVE-2015-8704)
Red Hat would like to thank ISC for reporting this issue.
All bind users are advised to upgrade to these updated packages, which
contain a backported patch to correct this issue. After installing the
update, the BIND daemon (named) will be restarted automatically.
Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2016-January/083792.html
https://lists.centos.org/pipermail/centos-announce/2016-January/083794.html
https://lists.centos.org/pipermail/centos-announce/2016-January/083797.html
Affected packages:
bind
bind-chroot
bind-devel
bind-libbind-devel
bind-libs
bind-libs-lite
bind-license
bind-lite-devel
bind-pkcs11
bind-pkcs11-devel
bind-pkcs11-libs
bind-pkcs11-utils
bind-sdb
bind-sdb-chroot
bind-utils
caching-nameserver
Upstream details at:
https://access.redhat.com/errata/RHSA-2016:0073
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
CentOS | 6 | i686 | bind | < 9.8.2-0.37.rc1.el6_7.6 | bind-9.8.2-0.37.rc1.el6_7.6.i686.rpm |
CentOS | 6 | i686 | bind-chroot | < 9.8.2-0.37.rc1.el6_7.6 | bind-chroot-9.8.2-0.37.rc1.el6_7.6.i686.rpm |
CentOS | 6 | i686 | bind-devel | < 9.8.2-0.37.rc1.el6_7.6 | bind-devel-9.8.2-0.37.rc1.el6_7.6.i686.rpm |
CentOS | 6 | i686 | bind-libs | < 9.8.2-0.37.rc1.el6_7.6 | bind-libs-9.8.2-0.37.rc1.el6_7.6.i686.rpm |
CentOS | 6 | i686 | bind-sdb | < 9.8.2-0.37.rc1.el6_7.6 | bind-sdb-9.8.2-0.37.rc1.el6_7.6.i686.rpm |
CentOS | 6 | i686 | bind-utils | < 9.8.2-0.37.rc1.el6_7.6 | bind-utils-9.8.2-0.37.rc1.el6_7.6.i686.rpm |
CentOS | 6 | x86_64 | bind | < 9.8.2-0.37.rc1.el6_7.6 | bind-9.8.2-0.37.rc1.el6_7.6.x86_64.rpm |
CentOS | 6 | x86_64 | bind-chroot | < 9.8.2-0.37.rc1.el6_7.6 | bind-chroot-9.8.2-0.37.rc1.el6_7.6.x86_64.rpm |
CentOS | 6 | i686 | bind-devel | < 9.8.2-0.37.rc1.el6_7.6 | bind-devel-9.8.2-0.37.rc1.el6_7.6.i686.rpm |
CentOS | 6 | x86_64 | bind-devel | < 9.8.2-0.37.rc1.el6_7.6 | bind-devel-9.8.2-0.37.rc1.el6_7.6.x86_64.rpm |
6.5 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:L/Au:S/C:N/I:N/A:C
0.958 High
EPSS
Percentile
99.4%