Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 146377 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.882658
Kategorie:CentOS Local Security Checks
Titel:CentOS Update for bind CESA-2017:0276 centos7
Zusammenfassung:Check the version of bind
Beschreibung:Summary:
Check the version of bind

Vulnerability Insight:
The Berkeley Internet Name Domain (BIND) is
an implementation of the Domain Name System (DNS) protocols. BIND includes a
DNS server (named) a resolver library (routines for applications to use when
interfacing with DNS) and tools for verifying that the DNS server is operating
correctly.

Security Fix(es):

* A denial of service flaw was found in the way BIND handled query
responses when both DNS64 and RPZ were used. A remote attacker could use
this flaw to make named exit unexpectedly with an assertion failure or a
null pointer dereference via a specially crafted DNS response.
(CVE-2017-3135)

Red Hat would like to thank ISC for reporting this issue. Upstream
acknowledges Ramesh Damodaran (Infoblox) and Aliaksandr Shubnik (Infoblox)
as the original reporter.

Affected Software/OS:
bind on CentOS 7

Solution:
Please Install the Updated Packages.

CVSS Score:
4.3

CVSS Vector:
AV:N/AC:M/Au:N/C:N/I:N/A:P

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2017-3135
BugTraq ID: 96150
http://www.securityfocus.com/bid/96150
Debian Security Information: DSA-3795 (Google Search)
https://www.debian.org/security/2017/dsa-3795
https://security.gentoo.org/glsa/201708-01
RedHat Security Advisories: RHSA-2017:0276
http://rhn.redhat.com/errata/RHSA-2017-0276.html
http://www.securitytracker.com/id/1037801
CopyrightCopyright (C) 2017 Greenbone AG

Dies ist nur einer von 146377 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.