Vulnerabilities > CVE-2011-2464 - Packet Processing Remote Denial of Service vulnerability in ISC BIND 9

047910
CVSS 5.0 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
NONE
Availability impact
PARTIAL
network
low complexity
isc
nessus

Summary

Unspecified vulnerability in ISC BIND 9 9.6.x before 9.6-ESV-R4-P3, 9.7.x before 9.7.3-P3, and 9.8.x before 9.8.0-P4 allows remote attackers to cause a denial of service (named daemon crash) via a crafted UPDATE request.

Nessus

  • NASL familyOracle Linux Local Security Checks
    NASL idORACLELINUX_ELSA-2011-0926.NASL
    descriptionFrom Red Hat Security Advisory 2011:0926 : Updated bind and bind97 packages that fix one security issue are now available for Red Hat Enterprise Linux 5 and 6. The Red Hat Security Response Team has rated this update as having important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. A flaw was discovered in the way BIND handled certain DNS requests. A remote attacker could use this flaw to send a specially crafted DNS request packet to BIND, causing it to exit unexpectedly due to a failed assertion. (CVE-2011-2464) Users of bind97 on Red Hat Enterprise Linux 5, and bind on Red Hat Enterprise Linux 6, are advised to upgrade to these updated packages, which resolve this issue. After installing the update, the BIND daemon (named) will be restarted automatically.
    last seen2020-06-01
    modified2020-06-02
    plugin id68303
    published2013-07-12
    reporterThis script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/68303
    titleOracle Linux 5 / 6 : bind (ELSA-2011-0926)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_11_4_BIND-110706.NASL
    descriptionA remote Denial of Service vulnerability has been fixed in bind. Specially crafted packets could cause bind servers (recursive as well as authoritative) to exit. CVE-2011-2464 has been assigned to this issue.
    last seen2020-06-01
    modified2020-06-02
    plugin id75794
    published2014-06-13
    reporterThis script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/75794
    titleopenSUSE Security Update : bind (openSUSE-SU-2011:0788-1)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_BIND-7614.NASL
    descriptionA remote denial of service vulnerability has been fixed in bind. Specially crafted packets could cause bind servers (recursive as well as authoritative) to exit.
    last seen2020-06-01
    modified2020-06-02
    plugin id57161
    published2011-12-13
    reporterThis script is Copyright (C) 2011-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/57161
    titleSuSE 10 Security Update : bind (ZYPP Patch Number 7614)
  • NASL familyUbuntu Local Security Checks
    NASL idUBUNTU_USN-1163-1.NASL
    descriptionIt was discovered that Bind incorrectly handled certain specially crafted packets. A remote attacker could use this flaw to cause Bind to stop responding, resulting in a denial of service. Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id55522
    published2011-07-06
    reporterUbuntu Security Notice (C) 2011-2019 Canonical, Inc. / NASL script (C) 2011-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/55522
    titleUbuntu 8.04 LTS / 10.04 LTS / 10.10 / 11.04 : bind9 vulnerability (USN-1163-1)
  • NASL familyMandriva Local Security Checks
    NASL idMANDRIVA_MDVSA-2011-115.NASL
    descriptionA vulnerability was discovered and corrected in bind : Unspecified vulnerability in ISC BIND 9 9.6.x before 9.6-ESV-R4-P3, 9.7.x before 9.7.3-P3, and 9.8.x before 9.8.0-P4 allows remote attackers to cause a denial of service (named daemon crash) via a crafted UPDATE request (CVE-2011-2464). Packages for 2009.0 are provided as of the Extended Maintenance Program. Please visit this link to learn more: http://store.mandriva.com/product_info.php?cPath=149 products_id=490 The updated packages have been upgraded to bind 9.7.3-P3 which is not vulnerable to this issue.
    last seen2020-06-01
    modified2020-06-02
    plugin id55634
    published2011-07-21
    reporterThis script is Copyright (C) 2011-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/55634
    titleMandriva Linux Security Advisory : bind (MDVSA-2011:115)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_11_BIND-110706.NASL
    descriptionA remote Denial of Service vulnerability has been fixed in bind. Specially crafted packets could cause bind servers (recursive as well as authoritative) to exit.
    last seen2020-06-01
    modified2020-06-02
    plugin id55547
    published2011-07-11
    reporterThis script is Copyright (C) 2011-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/55547
    titleSuSE 11.1 Security Update : bind (SAT Patch Number 4846)
  • NASL familyScientific Linux Local Security Checks
    NASL idSL_20110707_BIND_ON_SL5_X.NASL
    descriptionThe Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. A flaw was discovered in the way BIND handled certain DNS requests. A remote attacker could use this flaw to send a specially crafted DNS request packet to BIND, causing it to exit unexpectedly due to a failed assertion. (CVE-2011-2464) After installing the update, the BIND daemon (named) will be restarted automatically.
    last seen2020-06-01
    modified2020-06-02
    plugin id61080
    published2012-08-01
    reporterThis script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/61080
    titleScientific Linux Security Update : bind on SL5.x, SL6.x i386/x86_64
  • NASL familyGentoo Local Security Checks
    NASL idGENTOO_GLSA-201206-01.NASL
    descriptionThe remote host is affected by the vulnerability described in GLSA-201206-01 (BIND: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in BIND. Please review the CVE identifiers referenced below for details. Impact : The vulnerabilities allow remote attackers to cause a Denial of Service (daemon crash) via a DNS query, to bypass intended access restrictions, to incorrectly cache a ncache entry and a rrsig for the same type and to incorrectly mark zone data as insecure. Workaround : There is no known workaround at this time.
    last seen2020-06-01
    modified2020-06-02
    plugin id59629
    published2012-06-21
    reporterThis script is Copyright (C) 2012-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/59629
    titleGLSA-201206-01 : BIND: Multiple vulnerabilities
  • NASL familyMacOS X Local Security Checks
    NASL idMACOSX_10_7_2.NASL
    descriptionThe remote host is running a version of Mac OS X 10.7.x that is prior to 10.7.2. This version contains numerous security-related fixes for the following components : - Apache - Application Firewall - ATS - BIND - Certificate Trust Policy - CFNetwork - CoreMedia - CoreProcesses - CoreStorage - File Systems - iChat Server - Kernel - libsecurity - Open Directory - PHP - python - QuickTime - SMB File Server - X11
    last seen2020-06-01
    modified2020-06-02
    plugin id56480
    published2011-10-13
    reporterThis script is Copyright (C) 2011-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/56480
    titleMac OS X 10.7.x < 10.7.2 Multiple Vulnerabilities
  • NASL familyF5 Networks Local Security Checks
    NASL idF5_BIGIP_SOL12986.NASL
    descriptionUnspecified vulnerability in ISC BIND 9 9.6.x before 9.6-ESV-R4-P3, 9.7.x before 9.7.3-P3, and 9.8.x before 9.8.0-P4 allows remote attackers to cause a Denial of Service (DoS) (named daemon crash) by way of a crafted UPDATE request.
    last seen2020-06-01
    modified2020-06-02
    plugin id78130
    published2014-10-10
    reporterThis script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/78130
    titleF5 Networks BIG-IP : BIND vulnerability (SOL12986)
  • NASL familyFreeBSD Local Security Checks
    NASL idFREEBSD_PKG_FD64188DA71D11E089B4001EC9578670.NASL
    descriptionISC reports : A defect in the affected BIND 9 versions allows an attacker to remotely cause the
    last seen2020-06-01
    modified2020-06-02
    plugin id55518
    published2011-07-06
    reporterThis script is Copyright (C) 2011-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/55518
    titleFreeBSD : BIND -- Remote DoS against authoritative and recursive servers (fd64188d-a71d-11e0-89b4-001ec9578670)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_11_3_BIND-110706.NASL
    descriptionA remote Denial of Service vulnerability has been fixed in bind. Specially crafted packets could cause bind servers (recursive as well as authoritative) to exit. CVE-2011-2464 has been assigned to this issue.
    last seen2020-06-01
    modified2020-06-02
    plugin id75440
    published2014-06-13
    reporterThis script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/75440
    titleopenSUSE Security Update : bind (openSUSE-SU-2011:0788-1)
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-2272.NASL
    descriptionIt was discovered that BIND, a DNS server, does not correctly process certain UPDATE requests, resulting in a server crash and a denial of service. This vulnerability affects BIND installations even if they do not actually use dynamic DNS updates.
    last seen2020-03-17
    modified2011-07-06
    plugin id55516
    published2011-07-06
    reporterThis script is Copyright (C) 2011-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/55516
    titleDebian DSA-2272-1 : bind9 - denial of service
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2011-9127.NASL
    descriptionThis update fixes CVE-2011-2464. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id55657
    published2011-07-25
    reporterThis script is Copyright (C) 2011-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/55657
    titleFedora 14 : bind-9.7.4-0.3.b1.fc14 (2011-9127)
  • NASL familySlackware Local Security Checks
    NASL idSLACKWARE_SSA_2011-224-01.NASL
    descriptionNew bind packages are available for Slackware 8.1, 9.0, 9.1, 10.0, 10.1, 10.2, 11.0, 12.0, 12.1, 12.2, 13.0, 13.1, 13.37, and -current to fix security issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id55834
    published2011-08-15
    reporterThis script is Copyright (C) 2011-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/55834
    titleSlackware 10.0 / 10.1 / 10.2 / 11.0 / 12.0 / 12.1 / 12.2 / 13.0 / 13.1 / 13.37 / 8.1 / 9.0 / 9.1 / current : bind (SSA:2011-224-01)
  • NASL familyOracleVM Local Security Checks
    NASL idORACLEVM_OVMSA-2020-0021.NASL
    descriptionThe remote OracleVM system is missing necessary patches to address critical security updates : please see Oracle VM Security Advisory OVMSA-2020-0021 for details.
    last seen2020-06-10
    modified2020-06-05
    plugin id137170
    published2020-06-05
    reporterThis script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/137170
    titleOracleVM 3.3 / 3.4 : bind (OVMSA-2020-0021)
  • NASL familyCentOS Local Security Checks
    NASL idCENTOS_RHSA-2011-0926.NASL
    descriptionUpdated bind and bind97 packages that fix one security issue are now available for Red Hat Enterprise Linux 5 and 6. The Red Hat Security Response Team has rated this update as having important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. A flaw was discovered in the way BIND handled certain DNS requests. A remote attacker could use this flaw to send a specially crafted DNS request packet to BIND, causing it to exit unexpectedly due to a failed assertion. (CVE-2011-2464) Users of bind97 on Red Hat Enterprise Linux 5, and bind on Red Hat Enterprise Linux 6, are advised to upgrade to these updated packages, which resolve this issue. After installing the update, the BIND daemon (named) will be restarted automatically.
    last seen2020-06-01
    modified2020-06-02
    plugin id55536
    published2011-07-08
    reporterThis script is Copyright (C) 2011-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/55536
    titleCentOS 5 : bind97 (CESA-2011:0926)
  • NASL familyHP-UX Local Security Checks
    NASL idHPUX_PHNE_42727.NASL
    descriptions700_800 11.23 BIND 9.2.0 Revision 5.0 : The remote HP-UX host is affected by multiple vulnerabilities : - A potential security vulnerability has been identified with HP-UX running BIND. This vulnerability could be exploited remotely to create a Denial of Service (DoS). (HPSBUX02729 SSRT100687) - A potential security vulnerability has been identified with HP-UX running BIND. This vulnerability could be exploited remotely to create a Denial of Service (DoS). (HPSBUX02719 SSRT100658)
    last seen2020-06-01
    modified2020-06-02
    plugin id56840
    published2012-03-06
    reporterThis script is Copyright (C) 2012-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/56840
    titleHP-UX PHNE_42727 : s700_800 11.23 BIND 9.2.0 Revision 5.0
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2011-9146.NASL
    descriptionUpdate to the 9.8.0-P4 security release. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id55562
    published2011-07-12
    reporterThis script is Copyright (C) 2011-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/55562
    titleFedora 15 : bind-9.8.0-7.P4.fc15 (2011-9146)
  • NASL familyMacOS X Local Security Checks
    NASL idMACOSX_SECUPD2011-006.NASL
    descriptionThe remote host is running a version of Mac OS X 10.6 that does not have Security Update 2011-006 applied. This update contains numerous security-related fixes for the following components : - Apache - Application Firewall - ATS - BIND - Certificate Trust Policy - CFNetwork - CoreFoundation - CoreMedia - File Systems - IOGraphics - iChat Server - Mailman - MediaKit - PHP - postfix - python - QuickTime - Tomcat - User Documentation - Web Server - X11
    last seen2020-06-01
    modified2020-06-02
    plugin id56481
    published2011-10-13
    reporterThis script is Copyright (C) 2011-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/56481
    titleMac OS X Multiple Vulnerabilities (Security Update 2011-006)
  • NASL familySlackware Local Security Checks
    NASL idSLACKWARE_SSA_2011-189-01.NASL
    descriptionNew bind packages are available for Slackware 13.37, and -current to fix a security issue.
    last seen2020-06-01
    modified2020-06-02
    plugin id55704
    published2011-07-28
    reporterThis script is Copyright (C) 2011-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/55704
    titleSlackware 13.37 / current : bind (SSA:2011-189-01)
  • NASL familyOracleVM Local Security Checks
    NASL idORACLEVM_OVMSA-2017-0066.NASL
    descriptionThe remote OracleVM system is missing necessary patches to address critical security updates : - Fix CVE-2017-3136 (ISC change 4575) - Fix CVE-2017-3137 (ISC change 4578) - Fix and test caching CNAME before DNAME (ISC change 4558) - Fix CVE-2016-9147 (ISC change 4510) - Fix regression introduced by CVE-2016-8864 (ISC change 4530) - Restore SELinux contexts before named restart - Use /lib or /lib64 only if directory in chroot already exists - Tighten NSS library pattern, escape chroot mount path - Fix (CVE-2016-8864) - Do not change lib permissions in chroot (#1321239) - Support WKS records in chroot (#1297562) - Do not include patch backup in docs (fixes #1325081 patch) - Backported relevant parts of [RT #39567] (#1259923) - Increase ISC_SOCKET_MAXEVENTS to 2048 (#1326283) - Fix multiple realms in nsupdate script like upstream (#1313286) - Fix multiple realm in nsupdate script (#1313286) - Use resolver-query-timeout high enough to recover all forwarders (#1325081) - Fix (CVE-2016-2848) - Fix infinite loop in start_lookup (#1306504) - Fix (CVE-2016-2776)
    last seen2020-06-01
    modified2020-06-02
    plugin id99569
    published2017-04-21
    reporterThis script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/99569
    titleOracleVM 3.3 / 3.4 : bind (OVMSA-2017-0066)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2011-0926.NASL
    descriptionUpdated bind and bind97 packages that fix one security issue are now available for Red Hat Enterprise Linux 5 and 6. The Red Hat Security Response Team has rated this update as having important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. A flaw was discovered in the way BIND handled certain DNS requests. A remote attacker could use this flaw to send a specially crafted DNS request packet to BIND, causing it to exit unexpectedly due to a failed assertion. (CVE-2011-2464) Users of bind97 on Red Hat Enterprise Linux 5, and bind on Red Hat Enterprise Linux 6, are advised to upgrade to these updated packages, which resolve this issue. After installing the update, the BIND daemon (named) will be restarted automatically.
    last seen2020-06-01
    modified2020-06-02
    plugin id55539
    published2011-07-08
    reporterThis script is Copyright (C) 2011-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/55539
    titleRHEL 5 / 6 : bind (RHSA-2011:0926)
  • NASL familyDNS
    NASL idBIND9_980_P4.NASL
    descriptionAccording to its self-reported version number, the remote installation of BIND is potentially affected by a denial of service vulnerability. If an attacker sends a specially crafted request to a BIND server it may cause the name server process to crash. Note that Nessus has only relied on the version itself and has not attempted to determine whether or not the install is actually vulnerable.
    last seen2020-06-01
    modified2020-06-02
    plugin id55534
    published2011-07-07
    reporterThis script is Copyright (C) 2011-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/55534
    titleISC BIND 9 Unspecified Packet Processing Remote DoS

Oval

accepted2015-04-20T04:00:36.971-04:00
classvulnerability
contributors
  • nameYamini Mohan R
    organizationHewlett-Packard
  • nameSushant Kumar Singh
    organizationHewlett-Packard
  • nameSushant Kumar Singh
    organizationHewlett-Packard
  • namePrashant Kumar
    organizationHewlett-Packard
  • nameMike Cokus
    organizationThe MITRE Corporation
descriptionUnspecified vulnerability in ISC BIND 9 9.6.x before 9.6-ESV-R4-P3, 9.7.x before 9.7.3-P3, and 9.8.x before 9.8.0-P4 allows remote attackers to cause a denial of service (named daemon crash) via a crafted UPDATE request.
familyunix
idoval:org.mitre.oval:def:13997
statusaccepted
submitted2012-01-30T10:50:28.000-05:00
titleHP-UX Running BIND, Remote Denial of Service (DoS)
version50

Redhat

advisories
bugzilla
id718966
titleCVE-2011-2464 bind: Specially constructed packet will cause named to exit
oval
OR
  • commentRed Hat Enterprise Linux must be installed
    ovaloval:com.redhat.rhba:tst:20070304026
  • AND
    • commentRed Hat Enterprise Linux 5 is installed
      ovaloval:com.redhat.rhba:tst:20070331005
    • OR
      • AND
        • commentbind97 is earlier than 32:9.7.0-6.P2.el5_6.3
          ovaloval:com.redhat.rhsa:tst:20110926001
        • commentbind97 is signed with Red Hat redhatrelease key
          ovaloval:com.redhat.rhsa:tst:20110845002
      • AND
        • commentbind97-utils is earlier than 32:9.7.0-6.P2.el5_6.3
          ovaloval:com.redhat.rhsa:tst:20110926003
        • commentbind97-utils is signed with Red Hat redhatrelease key
          ovaloval:com.redhat.rhsa:tst:20110845004
      • AND
        • commentbind97-devel is earlier than 32:9.7.0-6.P2.el5_6.3
          ovaloval:com.redhat.rhsa:tst:20110926005
        • commentbind97-devel is signed with Red Hat redhatrelease key
          ovaloval:com.redhat.rhsa:tst:20110845006
      • AND
        • commentbind97-libs is earlier than 32:9.7.0-6.P2.el5_6.3
          ovaloval:com.redhat.rhsa:tst:20110926007
        • commentbind97-libs is signed with Red Hat redhatrelease key
          ovaloval:com.redhat.rhsa:tst:20110845008
      • AND
        • commentbind97-chroot is earlier than 32:9.7.0-6.P2.el5_6.3
          ovaloval:com.redhat.rhsa:tst:20110926009
        • commentbind97-chroot is signed with Red Hat redhatrelease key
          ovaloval:com.redhat.rhsa:tst:20110845010
  • AND
    • commentRed Hat Enterprise Linux 6 is installed
      ovaloval:com.redhat.rhba:tst:20111656003
    • OR
      • AND
        • commentbind is earlier than 32:9.7.3-2.el6_1.P3.2
          ovaloval:com.redhat.rhsa:tst:20110926012
        • commentbind is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhba:tst:20170651006
      • AND
        • commentbind-sdb is earlier than 32:9.7.3-2.el6_1.P3.2
          ovaloval:com.redhat.rhsa:tst:20110926014
        • commentbind-sdb is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhba:tst:20170651002
      • AND
        • commentbind-chroot is earlier than 32:9.7.3-2.el6_1.P3.2
          ovaloval:com.redhat.rhsa:tst:20110926016
        • commentbind-chroot is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhba:tst:20170651008
      • AND
        • commentbind-devel is earlier than 32:9.7.3-2.el6_1.P3.2
          ovaloval:com.redhat.rhsa:tst:20110926018
        • commentbind-devel is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhba:tst:20170651004
      • AND
        • commentbind-utils is earlier than 32:9.7.3-2.el6_1.P3.2
          ovaloval:com.redhat.rhsa:tst:20110926020
        • commentbind-utils is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhba:tst:20170651012
      • AND
        • commentbind-libs is earlier than 32:9.7.3-2.el6_1.P3.2
          ovaloval:com.redhat.rhsa:tst:20110926022
        • commentbind-libs is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhba:tst:20170651010
rhsa
idRHSA-2011:0926
released2011-07-07
severityImportant
titleRHSA-2011:0926: bind security update (Important)
rpms
  • bind-32:9.7.3-2.el6_1.P3.2
  • bind-chroot-32:9.7.3-2.el6_1.P3.2
  • bind-debuginfo-32:9.7.3-2.el6_1.P3.2
  • bind-devel-32:9.7.3-2.el6_1.P3.2
  • bind-libs-32:9.7.3-2.el6_1.P3.2
  • bind-sdb-32:9.7.3-2.el6_1.P3.2
  • bind-utils-32:9.7.3-2.el6_1.P3.2
  • bind97-32:9.7.0-6.P2.el5_6.3
  • bind97-chroot-32:9.7.0-6.P2.el5_6.3
  • bind97-debuginfo-32:9.7.0-6.P2.el5_6.3
  • bind97-devel-32:9.7.0-6.P2.el5_6.3
  • bind97-libs-32:9.7.0-6.P2.el5_6.3
  • bind97-utils-32:9.7.0-6.P2.el5_6.3

Seebug

bulletinFamilyexploit
descriptionBUGTRAQ ID: 48566 CVE ID: CVE-2011-2464 BIND是一个应用非常广泛的DNS协议的实现,由ISC负责维护,具体的开发由Nominum公司完成。 ISC BIND在处理特制的UPDATE请求时存在拒绝服务漏洞,远程攻击者可利用此漏洞影响递归和授权服务器,造成拒绝服务。 此漏洞源于处理UPDATE请求时的错误,通过发送特制的UPDATE请求造成named进程中断。因为漏洞代码所在位置,不可能通过named.conf中配置的ACL或禁用一些功能(在编译时或运行时)来保护BIND。 ISC BIND 9.7.1-P2 ISC BIND 9.7.1-P1 ISC BIND 9.7.1 ISC BIND 9.7.0 P2 ISC BIND 9.7.0 厂商补丁: ISC --- 目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载: http://www.isc.org/
idSSV:20706
last seen2017-11-19
modified2011-07-07
published2011-07-07
reporterRoot
titleISC BIND UPDATE请求处理拒绝服务漏洞

References