Vulnerability   
Search   
    Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.870824
Category:Red Hat Local Security Checks
Title:RedHat Update for bind97 RHSA-2012:1266-01
Summary:The remote host is missing an update for the 'bind97'; package(s) announced via the referenced advisory.
Description:Summary:
The remote host is missing an update for the 'bind97'
package(s) announced via the referenced advisory.

Vulnerability Insight:
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain
Name System (DNS) protocols. BIND includes a DNS server (named), a resolver
library (routines for applications to use when interfacing with DNS), and
tools for verifying that the DNS server is operating correctly.

A flaw was found in the way BIND handled resource records with a large
RDATA value. A malicious owner of a DNS domain could use this flaw to
create specially-crafted DNS resource records, that would cause a recursive
resolver or secondary server to exit unexpectedly with an assertion
failure. (CVE-2012-4244)

Users of bind97 are advised to upgrade to these updated packages, which
correct this issue. After installing the update, the BIND daemon (named)
will be restarted automatically.

Affected Software/OS:
bind97 on Red Hat Enterprise Linux (v. 5 server)

Solution:
Please Install the Updated Packages.

CVSS Score:
7.8

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2012-4244
http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html
BugTraq ID: 55522
http://www.securityfocus.com/bid/55522
Debian Security Information: DSA-2547 (Google Search)
http://www.debian.org/security/2012/dsa-2547
http://lists.fedoraproject.org/pipermail/package-announce/2012-September/087703.html
http://lists.fedoraproject.org/pipermail/package-announce/2012-September/088381.html
http://lists.fedoraproject.org/pipermail/package-announce/2012-September/087697.html
HPdes Security Advisory: HPSBOV03226
http://marc.info/?l=bugtraq&m=141879471518471&w=2
HPdes Security Advisory: SSRT101004
http://www.mandriva.com/security/advisories?name=MDVSA-2012:152
RedHat Security Advisories: RHSA-2012:1266
http://rhn.redhat.com/errata/RHSA-2012-1266.html
RedHat Security Advisories: RHSA-2012:1267
http://rhn.redhat.com/errata/RHSA-2012-1267.html
RedHat Security Advisories: RHSA-2012:1268
http://rhn.redhat.com/errata/RHSA-2012-1268.html
RedHat Security Advisories: RHSA-2012:1365
http://rhn.redhat.com/errata/RHSA-2012-1365.html
http://secunia.com/advisories/50560
http://secunia.com/advisories/50579
http://secunia.com/advisories/50582
http://secunia.com/advisories/50645
http://secunia.com/advisories/50673
http://secunia.com/advisories/51096
SuSE Security Announcement: SUSE-SU-2012:1199 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00022.html
SuSE Security Announcement: SUSE-SU-2012:1333 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00007.html
SuSE Security Announcement: openSUSE-SU-2012:1192 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00021.html
http://www.ubuntu.com/usn/USN-1566-1
CopyrightCopyright (c) 2012 Greenbone Networks GmbH

This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2021 E-Soft Inc. All rights reserved.