Vulnerability   
Search   
    Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.871108
Category:Red Hat Local Security Checks
Title:RedHat Update for bind RHSA-2014:0043-01
Summary:The remote host is missing an update for the 'bind'; package(s) announced via the referenced advisory.
Description:Summary:
The remote host is missing an update for the 'bind'
package(s) announced via the referenced advisory.

Vulnerability Insight:
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain
Name System (DNS) protocols. BIND includes a DNS server (named) a resolver
library (routines for applications to use when interfacing with DNS) and
tools for verifying that the DNS server is operating correctly.

A denial of service flaw was found in the way BIND handled queries for
NSEC3-signed zones. A remote attacker could use this flaw against an
authoritative name server that served NCES3-signed zones by sending a
specially crafted query, which, when processed, would cause named to crash.
(CVE-2014-0591)

All bind users are advised to upgrade to these updated packages, which
contain a backported patch to correct this issue. After installing the
update, the BIND daemon (named) will be restarted automatically.

Affected Software/OS:
bind on Red Hat Enterprise Linux Desktop (v. 6),
Red Hat Enterprise Linux Server (v. 6),
Red Hat Enterprise Linux Workstation (v. 6)

Solution:
Please Install the Updated Packages.

CVSS Score:
2.6

CVSS Vector:
AV:N/AC:H/Au:N/C:N/I:N/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2014-0591
http://archives.neohapsis.com/archives/bugtraq/2014-10/0103.html
BugTraq ID: 64801
http://www.securityfocus.com/bid/64801
Debian Security Information: DSA-3023 (Google Search)
http://www.debian.org/security/2014/dsa-3023
http://lists.fedoraproject.org/pipermail/package-announce/2014-January/126772.html
http://lists.fedoraproject.org/pipermail/package-announce/2014-January/126761.html
FreeBSD Security Advisory: FreeBSD-SA-14:04
http://www.freebsd.org/security/advisories/FreeBSD-SA-14:04.bind.asc
HPdes Security Advisory: HPSBUX02961
http://marc.info/?l=bugtraq&m=138995561732658&w=2
HPdes Security Advisory: SSRT101420
http://www.mandriva.com/security/advisories?name=MDVSA-2014:002
http://osvdb.org/101973
RedHat Security Advisories: RHSA-2014:0043
http://rhn.redhat.com/errata/RHSA-2014-0043.html
http://www.securitytracker.com/id/1029589
http://secunia.com/advisories/56425
http://secunia.com/advisories/56427
http://secunia.com/advisories/56442
http://secunia.com/advisories/56493
http://secunia.com/advisories/56522
http://secunia.com/advisories/56574
http://secunia.com/advisories/56871
http://secunia.com/advisories/61117
http://secunia.com/advisories/61199
http://secunia.com/advisories/61343
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2014&m=slackware-security.524465
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2014&m=slackware-security.518391
SuSE Security Announcement: SUSE-SU-2015:0480 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00009.html
SuSE Security Announcement: openSUSE-SU-2014:0199 (Google Search)
http://lists.opensuse.org/opensuse-updates/2014-02/msg00016.html
SuSE Security Announcement: openSUSE-SU-2014:0202 (Google Search)
http://lists.opensuse.org/opensuse-updates/2014-02/msg00019.html
http://www.ubuntu.com/usn/USN-2081-1
CopyrightCopyright (C) 2014 Greenbone Networks GmbH

This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2021 E-Soft Inc. All rights reserved.