Lucene search

K
mageiaGentoo FoundationMGASA-2015-0341
HistorySep 08, 2015 - 10:20 a.m.

Updated bind packages fix security vulnerabilities

2015-09-0810:20:40
Gentoo Foundation
advisories.mageia.org
10

7.8 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

0.966 High

EPSS

Percentile

99.6%

Updated bind packages fix security vulnerability: Parsing a malformed DNSSEC key can cause a validating resolver to exit due to a failed assertion in buffer.c. It is possible for a remote attacker to deliberately trigger this condition, for example by using a query which requires a response from a zone containing a deliberately malformed key (CVE-2015-5722). An incorrect boundary check in openpgpkey_61.c can cause named to terminate due to a REQUIRE assertion failure. This defect can be deliberately exploited by an attacker who can provide a maliciously constructed response in answer to a query (CVE-2015-5986).

OSVersionArchitecturePackageVersionFilename
Mageia4noarchbind< 9.9.7.P3-1bind-9.9.7.P3-1.mga4
Mageia5noarchbind< 9.10.2.P4-1bind-9.10.2.P4-1.mga5

7.8 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

0.966 High

EPSS

Percentile

99.6%