Описание
A denial of service flaw was found in the way BIND handled DNSSEC validation. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS response.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | Specific to RHEL |
| esm-infra-legacy/trusty | not-affected | Specific to RHEL |
| esm-infra/xenial | not-affected | Specific to RHEL |
| precise | not-affected | Specific to RHEL |
| trusty | not-affected | Specific to RHEL |
| trusty/esm | not-affected | Specific to RHEL |
| upstream | not-affected | |
| vivid/stable-phone-overlay | not-affected | Specific to RHEL |
| vivid/ubuntu-core | not-affected | Specific to RHEL |
| xenial | not-affected | Specific to RHEL |
Показывать по
EPSS
5 Medium
CVSS2
7.5 High
CVSS3
Связанные уязвимости
A denial of service flaw was found in the way BIND handled DNSSEC validation. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS response.
A denial of service flaw was found in the way BIND handled DNSSEC validation. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS response.
A denial of service flaw was found in the way BIND handled DNSSEC vali ...
A denial of service flaw was found in the way BIND handled DNSSEC validation. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS response.
EPSS
5 Medium
CVSS2
7.5 High
CVSS3