Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2015-4620

Опубликовано: 07 июл. 2015
Источник: redhat
CVSS2: 5
EPSS Средний

Описание

name.c in named in ISC BIND 9.7.x through 9.9.x before 9.9.7-P1 and 9.10.x before 9.10.2-P2, when configured as a recursive resolver with DNSSEC validation, allows remote attackers to cause a denial of service (REQUIRE assertion failure and daemon exit) by constructing crafted zone data and then making a query for a name in that zone.

A flaw was found in the way BIND performed DNSSEC validation. An attacker able to make BIND (functioning as a DNS resolver with DNSSEC validation enabled) resolve a name in an attacker-controlled domain could cause named to exit unexpectedly with an assertion failure.

Отчет

This issue did not affect the versions of bind packages as shipped with Red Hat Enterprise Linux 4 and 5. This issue affects the versions of bind97 packages as shipped with Red Hat Enterprise Linux 5. Red Hat Enterprise Linux 5 is now in Production 3 Phase of the support and maintenance life cycle. This has been rated as having Important security impact and is not currently planned to be addressed in future bind97 packages updates in Red Hat Enterprise Linux 5. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 4bindNot affected
Red Hat Enterprise Linux 5bindNot affected
Red Hat Enterprise Linux 5bind97Will not fix
Red Hat Enterprise Linux 6bindFixedRHSA-2015:147122.07.2015
Red Hat Enterprise Linux 7bindFixedRHSA-2015:144320.07.2015

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-456->CWE-617
https://bugzilla.redhat.com/show_bug.cgi?id=1237258bind: abort DoS caused by uninitialized value use in isselfsigned()

EPSS

Процентиль: 94%
0.13878
Средний

5 Medium

CVSS2

Связанные уязвимости

ubuntu
около 10 лет назад

name.c in named in ISC BIND 9.7.x through 9.9.x before 9.9.7-P1 and 9.10.x before 9.10.2-P2, when configured as a recursive resolver with DNSSEC validation, allows remote attackers to cause a denial of service (REQUIRE assertion failure and daemon exit) by constructing crafted zone data and then making a query for a name in that zone.

nvd
около 10 лет назад

name.c in named in ISC BIND 9.7.x through 9.9.x before 9.9.7-P1 and 9.10.x before 9.10.2-P2, when configured as a recursive resolver with DNSSEC validation, allows remote attackers to cause a denial of service (REQUIRE assertion failure and daemon exit) by constructing crafted zone data and then making a query for a name in that zone.

debian
около 10 лет назад

name.c in named in ISC BIND 9.7.x through 9.9.x before 9.9.7-P1 and 9. ...

github
больше 3 лет назад

name.c in named in ISC BIND 9.7.x through 9.9.x before 9.9.7-P1 and 9.10.x before 9.10.2-P2, when configured as a recursive resolver with DNSSEC validation, allows remote attackers to cause a denial of service (REQUIRE assertion failure and daemon exit) by constructing crafted zone data and then making a query for a name in that zone.

oracle-oval
около 10 лет назад

ELSA-2015-1471: bind security update (IMPORTANT)

EPSS

Процентиль: 94%
0.13878
Средний

5 Medium

CVSS2

Уязвимость CVE-2015-4620