Lucene search

K
mageiaGentoo FoundationMGASA-2013-0237
HistoryJul 29, 2013 - 6:02 p.m.

Updated bind package fixes security vulnerability

2013-07-2918:02:52
Gentoo Foundation
advisories.mageia.org
13

7.8 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

0.955 High

EPSS

Percentile

99.4%

The RFC 5011 implementation in rdata.c in ISC BIND 9.7.x and 9.8.x before 9.8.5-P2, 9.8.6b1, 9.9.x before 9.9.3-P2, and 9.9.4b1, and DNSco BIND 9.9.3-S1 before 9.9.3-S1-P1 and 9.9.4-S1b1, allows remote attackers to cause a denial of service (daemon crash) via a query with a malformed RDATA section that is not properly handled during construction of a log message, as exploited in the wild in July 2013 (CVE-2013-4854).

OSVersionArchitecturePackageVersionFilename
Mageia2noarchbind<Β 9.9.3.P2-1bind-9.9.3.P2-1.mga2
Mageia3noarchbind<Β 9.9.3.P2-1bind-9.9.3.P2-1.mga3

7.8 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

0.955 High

EPSS

Percentile

99.4%