|Category:||Red Hat Local Security Checks|
|Title:||RedHat Update for bind97 RHSA-2013:1115-01|
|Summary:||The remote host is missing an update for the 'bind97'; package(s) announced via the referenced advisory.|
The remote host is missing an update for the 'bind97'
package(s) announced via the referenced advisory.
The Berkeley Internet Name Domain (BIND) is an implementation of the
Domain Name System (DNS) protocols. BIND includes a DNS server (named) a
resolver library (routines for applications to use when interfacing with
DNS) and tools for verifying that the DNS server is operating correctly.
A denial of service flaw was found in BIND. A remote attacker could use
this flaw to send a specially-crafted DNS query to named that, when
processed, would cause named to crash when rejecting the malformed query.
All bind97 users are advised to upgrade to these updated packages, which
contain a backported patch to correct this issue. After installing the
update, the BIND daemon (named) will be restarted automatically.
bind97 on Red Hat Enterprise Linux (v. 5 server)
Please Install the Updated Packages.
Common Vulnerability Exposure (CVE) ID: CVE-2013-4854|
BugTraq ID: 61479
Bugtraq: 20130806 [slackware-security] bind (SSA:2013-218-01) (Google Search)
Debian Security Information: DSA-2728 (Google Search)
FreeBSD Security Advisory: FreeBSD-SA-13:07
HPdes Security Advisory: HPSBUX02926
HPdes Security Advisory: SSRT101281
RedHat Security Advisories: RHSA-2013:1114
RedHat Security Advisories: RHSA-2013:1115
SuSE Security Announcement: SUSE-SU-2013:1310 (Google Search)
SuSE Security Announcement: openSUSE-SU-2013:1354 (Google Search)
XForce ISS Database: isc-bind-cve20134854-dos(86004)
|Copyright||Copyright (c) 2014 Greenbone Networks GmbH|
|This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.