|Category:||Red Hat Local Security Checks|
|Title:||RedHat Update for bind RHSA-2012:1123-01|
|Summary:||The remote host is missing an update for the 'bind'; package(s) announced via the referenced advisory.|
The remote host is missing an update for the 'bind'
package(s) announced via the referenced advisory.
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain
Name System (DNS) protocols. BIND includes a DNS server (named), a resolver
library (routines for applications to use when interfacing with DNS), and
tools for verifying that the DNS server is operating correctly.
An uninitialized data structure use flaw was found in BIND when DNSSEC
validation was enabled. A remote attacker able to send a large number of
queries to a DNSSEC validating BIND resolver could use this flaw to cause
it to exit unexpectedly with an assertion failure. (CVE-2012-3817)
Users of bind are advised to upgrade to these updated packages, which
correct this issue. After installing the update, the BIND daemon (named)
will be restarted automatically.
bind on Red Hat Enterprise Linux (v. 5 server),
Red Hat Enterprise Linux Desktop (v. 6),
Red Hat Enterprise Linux Server (v. 6),
Red Hat Enterprise Linux Workstation (v. 6)
Please Install the Updated Packages.
Common Vulnerability Exposure (CVE) ID: CVE-2012-3817|
Debian Security Information: DSA-2517 (Google Search)
RedHat Security Advisories: RHSA-2012:1122
RedHat Security Advisories: RHSA-2012:1123
SuSE Security Announcement: openSUSE-SU-2012:0969 (Google Search)
SuSE Security Announcement: openSUSE-SU-2012:0971 (Google Search)
|Copyright||Copyright (c) 2012 Greenbone Networks GmbH|
|This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.