Lucene search

K
mageiaGentoo FoundationMGASA-2015-0272
HistoryJul 09, 2015 - 11:09 a.m.

Updated bind package fixes security vulnerability

2015-07-0911:09:20
Gentoo Foundation
advisories.mageia.org
10

7.8 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

0.157 Low

EPSS

Percentile

95.9%

A recursive resolver that is performing DNSSEC validation can be deliberately terminated by any attacker who can cause a query to be performed against a maliciously constructed zone. This will result in a denial of service to clients who rely on that resolver (CVE-2015-4620). Note that DNSSEC validation is not enabled by default.

OSVersionArchitecturePackageVersionFilename
Mageia4noarchbind< 9.9.7.P1-1bind-9.9.7.P1-1.mga4
Mageia5noarchbind< 9.10.2.P2-1bind-9.10.2.P2-1.mga5

7.8 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

0.157 Low

EPSS

Percentile

95.9%