Описание
Security update for bind
This update for bind fixes the following issues:
Fix two assertion failures that can lead to a remote denial of service attack:
- CVE-2016-1285: An error when parsing signature records for DNAME can lead to named exiting due to an assertion failure. (bsc#970072)
- CVE-2016-1286: An error when parsing signature records for DNAME records having specific properties can lead to named exiting due to an assertion failure in resolver.c or db.c. (bsc#970073)
This update was imported from the SUSE:SLE-12-SP1:Update update project.
Список пакетов
openSUSE Leap 42.1
Ссылки
- E-Mail link for openSUSE-SU-2016:0859-1
- SUSE Security Ratings
Описание
named in ISC BIND 9.x before 9.9.8-P4 and 9.10.x before 9.10.3-P4 does not properly handle DNAME records when parsing fetch reply messages, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a malformed packet to the rndc (aka control channel) interface, related to alist.c and sexpr.c.
Затронутые продукты
Ссылки
- CVE-2016-1285
- SUSE Bug 970072
- SUSE Bug 978322
- SUSE Bug 981200
Описание
named in ISC BIND 9.x before 9.9.8-P4 and 9.10.x before 9.10.3-P4 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a crafted signature record for a DNAME record, related to db.c and resolver.c.
Затронутые продукты
Ссылки
- CVE-2016-1286
- SUSE Bug 970073
- SUSE Bug 978322
- SUSE Bug 981200