[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249622

 
 

909

 
 

195521

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ELSA-2011-1458 -- Oracle bind

ID: oval:org.secpod.oval:def:1503331Date: (C)2021-01-08   (M)2023-12-07
Class: PATCHFamily: unix




Updated bind packages that fix one security issue are now available for Red Hat Enterprise Linux 5 and 6. The Red Hat Security Response Team has rated this update as having important security impact. A Common Vulnerability Scoring System base score, which gives a detailed severity rating, is available from the CVE link in the References section. Description The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. A flaw was discovered in the way BIND handled certain DNS queries, which caused it to cache an invalid record. A remote attacker could use this flaw to send repeated queries for this invalid record, causing the resolvers to exit unexpectedly due to a failed assertion. Users of bind are advised to upgrade to these updated packages, which resolve this issue. After installing the update, the BIND daemon will be restarted automatically.

Platform:
Oracle Linux 6
Product:
bind
Reference:
ELSA-2011-1458
CVE-2011-4313
CVE    1
CVE-2011-4313
CPE    241
cpe:/a:isc:bind:9.2.4:rc2
cpe:/a:isc:bind:9.2.4:rc3
cpe:/a:isc:bind:9.3.1:rc1
cpe:/a:isc:bind:9.2.4:rc4
...

© SecPod Technologies