Vulnerabilities > CVE-2015-5722 - Improper Input Validation vulnerability in multiple products

047910
CVSS 7.8 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
NONE
Availability impact
COMPLETE
network
low complexity
isc
apple
CWE-20
nessus

Summary

buffer.c in named in ISC BIND 9.x before 9.9.7-P3 and 9.10.x before 9.10.2-P4 allows remote attackers to cause a denial of service (assertion failure and daemon exit) by creating a zone containing a malformed DNSSEC key and issuing a query for a name in that zone.

Common Weakness Enumeration (CWE)

Common Attack Pattern Enumeration and Classification (CAPEC)

  • Buffer Overflow via Environment Variables
    This attack pattern involves causing a buffer overflow through manipulation of environment variables. Once the attacker finds that they can modify an environment variable, they may try to overflow associated buffers. This attack leverages implicit trust often placed in environment variables.
  • Server Side Include (SSI) Injection
    An attacker can use Server Side Include (SSI) Injection to send code to a web application that then gets executed by the web server. Doing so enables the attacker to achieve similar results to Cross Site Scripting, viz., arbitrary code execution and information disclosure, albeit on a more limited scale, since the SSI directives are nowhere near as powerful as a full-fledged scripting language. Nonetheless, the attacker can conveniently gain access to sensitive files, such as password files, and execute shell commands.
  • Cross Zone Scripting
    An attacker is able to cause a victim to load content into their web-browser that bypasses security zone controls and gain access to increased privileges to execute scripting code or other web objects such as unsigned ActiveX controls or applets. This is a privilege elevation attack targeted at zone-based web-browser security. In a zone-based model, pages belong to one of a set of zones corresponding to the level of privilege assigned to that page. Pages in an untrusted zone would have a lesser level of access to the system and/or be restricted in the types of executable content it was allowed to invoke. In a cross-zone scripting attack, a page that should be assigned to a less privileged zone is granted the privileges of a more trusted zone. This can be accomplished by exploiting bugs in the browser, exploiting incorrect configuration in the zone controls, through a cross-site scripting attack that causes the attackers' content to be treated as coming from a more trusted page, or by leveraging some piece of system functionality that is accessible from both the trusted and less trusted zone. This attack differs from "Restful Privilege Escalation" in that the latter correlates to the inadequate securing of RESTful access methods (such as HTTP DELETE) on the server, while cross-zone scripting attacks the concept of security zones as implemented by a browser.
  • Cross Site Scripting through Log Files
    An attacker may leverage a system weakness where logs are susceptible to log injection to insert scripts into the system's logs. If these logs are later viewed by an administrator through a thin administrative interface and the log data is not properly HTML encoded before being written to the page, the attackers' scripts stored in the log will be executed in the administrative interface with potentially serious consequences. This attack pattern is really a combination of two other attack patterns: log injection and stored cross site scripting.
  • Command Line Execution through SQL Injection
    An attacker uses standard SQL injection methods to inject data into the command line for execution. This could be done directly through misuse of directives such as MSSQL_xp_cmdshell or indirectly through injection of data into the database that would be interpreted as shell commands. Sometime later, an unscrupulous backend application (or could be part of the functionality of the same application) fetches the injected data stored in the database and uses this data as command line arguments without performing proper validation. The malicious data escapes that data plane by spawning new commands to be executed on the host.

Nessus

  • NASL familyAmazon Linux Local Security Checks
    NASL idALA_ALAS-2015-594.NASL
    descriptionAs discussed upstream, parsing a malformed DNSSEC key can cause a validating resolver to exit due to a failed assertion in buffer.c. It is possible for a remote attacker to deliberately trigger this condition, for example by using a query which requires a response from a zone containing a deliberately malformed key. (CVE-2015-5722) Also disclosed upstream today was CVE-2015-5986 which does not impact the version of bind in the Amazon Linux AMI.
    last seen2020-06-01
    modified2020-06-02
    plugin id85752
    published2015-09-03
    reporterThis script is Copyright (C) 2015-2018 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/85752
    titleAmazon Linux AMI : bind (ALAS-2015-594)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were
    # extracted from Amazon Linux AMI Security Advisory ALAS-2015-594.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(85752);
      script_version("2.7");
      script_cvs_date("Date: 2018/12/18 10:18:58");
    
      script_cve_id("CVE-2015-5722");
      script_xref(name:"ALAS", value:"2015-594");
    
      script_name(english:"Amazon Linux AMI : bind (ALAS-2015-594)");
      script_summary(english:"Checks rpm output for the updated packages");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Amazon Linux AMI host is missing a security update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "As discussed upstream, parsing a malformed DNSSEC key can cause a
    validating resolver to exit due to a failed assertion in buffer.c. It
    is possible for a remote attacker to deliberately trigger this
    condition, for example by using a query which requires a response from
    a zone containing a deliberately malformed key. (CVE-2015-5722)
    
    Also disclosed upstream today was CVE-2015-5986 which does not impact
    the version of bind in the Amazon Linux AMI."
      );
      # https://kb.isc.org/article/AA-01287/0
      script_set_attribute(
        attribute:"see_also",
        value:"https://kb.isc.org/docs/aa-01287"
      );
      # https://kb.isc.org/article/AA-01291/0
      script_set_attribute(
        attribute:"see_also",
        value:"https://kb.isc.org/docs/aa-01291"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://alas.aws.amazon.com/ALAS-2015-594.html"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Run 'yum update bind' to update your system."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:bind");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:bind-chroot");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:bind-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:bind-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:bind-libs");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:bind-sdb");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:bind-utils");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:amazon:linux");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2015/09/02");
      script_set_attribute(attribute:"plugin_publication_date", value:"2015/09/03");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2015-2018 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Amazon Linux Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/AmazonLinux/release", "Host/AmazonLinux/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    
    release = get_kb_item("Host/AmazonLinux/release");
    if (isnull(release) || !strlen(release)) audit(AUDIT_OS_NOT, "Amazon Linux");
    os_ver = pregmatch(pattern: "^AL(A|\d)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Amazon Linux");
    os_ver = os_ver[1];
    if (os_ver != "A")
    {
      if (os_ver == 'A') os_ver = 'AMI';
      audit(AUDIT_OS_NOT, "Amazon Linux AMI", "Amazon Linux " + os_ver);
    }
    
    if (!get_kb_item("Host/AmazonLinux/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    
    flag = 0;
    if (rpm_check(release:"ALA", reference:"bind-9.8.2-0.30.rc1.39.amzn1")) flag++;
    if (rpm_check(release:"ALA", reference:"bind-chroot-9.8.2-0.30.rc1.39.amzn1")) flag++;
    if (rpm_check(release:"ALA", reference:"bind-debuginfo-9.8.2-0.30.rc1.39.amzn1")) flag++;
    if (rpm_check(release:"ALA", reference:"bind-devel-9.8.2-0.30.rc1.39.amzn1")) flag++;
    if (rpm_check(release:"ALA", reference:"bind-libs-9.8.2-0.30.rc1.39.amzn1")) flag++;
    if (rpm_check(release:"ALA", reference:"bind-sdb-9.8.2-0.30.rc1.39.amzn1")) flag++;
    if (rpm_check(release:"ALA", reference:"bind-utils-9.8.2-0.30.rc1.39.amzn1")) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
      else security_hole(0);
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "bind / bind-chroot / bind-debuginfo / bind-devel / bind-libs / etc");
    }
    
  • NASL familyFreeBSD Local Security Checks
    NASL idFREEBSD_PKG_EAF3B255524511E59AD814DAE9D210B8.NASL
    descriptionISC reports : Parsing a malformed DNSSEC key can cause a validating resolver to exit due to a failed assertion in buffer.c. It is possible for a remote attacker to deliberately trigger this condition, for example by using a query which requires a response from a zone containing a deliberately malformed key.
    last seen2020-06-01
    modified2020-06-02
    plugin id85776
    published2015-09-04
    reporterThis script is Copyright (C) 2015-2018 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/85776
    titleFreeBSD : bind -- denial of service vulnerability (eaf3b255-5245-11e5-9ad8-14dae9d210b8)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from the FreeBSD VuXML database :
    #
    # Copyright 2003-2018 Jacques Vidrine and contributors
    #
    # Redistribution and use in source (VuXML) and 'compiled' forms (SGML,
    # HTML, PDF, PostScript, RTF and so forth) with or without modification,
    # are permitted provided that the following conditions are met:
    # 1. Redistributions of source code (VuXML) must retain the above
    #    copyright notice, this list of conditions and the following
    #    disclaimer as the first lines of this file unmodified.
    # 2. Redistributions in compiled form (transformed to other DTDs,
    #    published online in any format, converted to PDF, PostScript,
    #    RTF and other formats) must reproduce the above copyright
    #    notice, this list of conditions and the following disclaimer
    #    in the documentation and/or other materials provided with the
    #    distribution.
    # 
    # THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS "AS IS"
    # AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,
    # THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
    # PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS
    # BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,
    # OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT
    # OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
    # BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
    # WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
    # OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,
    # EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(85776);
      script_version("1.7");
      script_cvs_date("Date: 2018/11/10 11:49:44");
    
      script_cve_id("CVE-2015-5722");
      script_xref(name:"FreeBSD", value:"SA-15:23.bind");
    
      script_name(english:"FreeBSD : bind -- denial of service vulnerability (eaf3b255-5245-11e5-9ad8-14dae9d210b8)");
      script_summary(english:"Checks for updated packages in pkg_info output");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:
    "The remote FreeBSD host is missing one or more security-related
    updates."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "ISC reports :
    
    Parsing a malformed DNSSEC key can cause a validating resolver to exit
    due to a failed assertion in buffer.c. It is possible for a remote
    attacker to deliberately trigger this condition, for example by using
    a query which requires a response from a zone containing a
    deliberately malformed key."
      );
      # https://www.isc.org/blogs/cve-2015-5722-parsing-malformed-keys-may-cause-bind-to-exit-due-to-a-failed-assertion-in-buffer-c/
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?f747ae1b"
      );
      # https://vuxml.freebsd.org/freebsd/eaf3b255-5245-11e5-9ad8-14dae9d210b8.html
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?2058c8c6"
      );
      script_set_attribute(attribute:"solution", value:"Update the affected packages.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:freebsd:freebsd:bind910");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:freebsd:freebsd:bind910-base");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:freebsd:freebsd:bind99");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:freebsd:freebsd:bind99-base");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:freebsd:freebsd");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2015/08/19");
      script_set_attribute(attribute:"patch_publication_date", value:"2015/09/03");
      script_set_attribute(attribute:"plugin_publication_date", value:"2015/09/04");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2015-2018 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"FreeBSD Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/FreeBSD/release", "Host/FreeBSD/pkg_info");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("freebsd_package.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if (!get_kb_item("Host/FreeBSD/release")) audit(AUDIT_OS_NOT, "FreeBSD");
    if (!get_kb_item("Host/FreeBSD/pkg_info")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    
    flag = 0;
    
    if (pkg_test(save_report:TRUE, pkg:"bind99<9.9.7P3")) flag++;
    if (pkg_test(save_report:TRUE, pkg:"bind910>=9.10.2<9.10.2P4")) flag++;
    if (pkg_test(save_report:TRUE, pkg:"bind910-base>0")) flag++;
    if (pkg_test(save_report:TRUE, pkg:"bind99-base>0")) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:pkg_report_get());
      else security_hole(0);
      exit(0);
    }
    else audit(AUDIT_HOST_NOT, "affected");
    
  • NASL familyAIX Local Security Checks
    NASL idAIX_IV78096.NASL
    descriptionISC BIND is vulnerable to a denial of service, caused by the exit of a validating resolver due to an assertion failure in buffer.c. By parsing a malformed DNSSEC key, a remote attacker could exploit this vulnerability to cause a denial of service.
    last seen2020-06-01
    modified2020-06-02
    plugin id86769
    published2015-11-06
    reporterThis script is Copyright (C) 2015 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/86769
    titleAIX 6.1 TL 8 : bind (IV78096)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The text in the description was extracted from AIX Security
    # Advisory bind_advisory9.asc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(86769);
      script_version("$Revision: 2.4 $");
      script_cvs_date("$Date: 2015/12/19 18:41:38 $");
    
      script_cve_id("CVE-2015-5722");
    
      script_name(english:"AIX 6.1 TL 8 : bind (IV78096)");
      script_summary(english:"Check for APAR IV78096");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote AIX host is missing a security patch."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "ISC BIND is vulnerable to a denial of service, caused by the exit of a
    validating resolver due to an assertion failure in buffer.c. By
    parsing a malformed DNSSEC key, a remote attacker could exploit this
    vulnerability to cause a denial of service."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://aix.software.ibm.com/aix/efixes/security/bind_advisory9.asc"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Install the appropriate interim fix."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:ibm:aix:6.1");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2015/11/03");
      script_set_attribute(attribute:"patch_publication_date", value:"2015/11/03");
      script_set_attribute(attribute:"plugin_publication_date", value:"2015/11/06");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2015 Tenable Network Security, Inc.");
      script_family(english:"AIX Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/AIX/lslpp", "Host/local_checks_enabled", "Host/AIX/version");
    
      exit(0);
    }
    
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("aix.inc");
    include("misc_func.inc");
    
    if ( ! get_kb_item("Host/local_checks_enabled") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if ( ! get_kb_item("Host/AIX/version") ) audit(AUDIT_OS_NOT, "AIX");
    if ( ! get_kb_item("Host/AIX/lslpp") ) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    if ( get_kb_item("Host/AIX/emgr_failure" ) ) exit(0, "This iFix check is disabled because : "+get_kb_item("Host/AIX/emgr_failure") );
    
    flag = 0;
    
    if (aix_check_ifix(release:"6.1", ml:"08", sp:"07", patch:"IV78096m7a", package:"bos.net.tcp.client", minfilesetver:"6.1.8.0", maxfilesetver:"6.1.8.20") < 0) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:aix_report_get());
      else security_hole(0);
      exit(0);
    }
    else audit(AUDIT_HOST_NOT, "affected");
    
  • NASL familyAIX Local Security Checks
    NASL idAIX_U861500.NASL
    descriptionThe remote host is missing AIX PTF U861500, which is related to the security of the package bos.net.tcp.client. Product could allow a remote attacker to obtain sensitive information, caused by a design error when using the SSLv3 protocol. A remote user with the ability to conduct a man-in-the-middle attack could exploit this vulnerability via a POODLE (Padding Oracle On Downgraded Legacy Encryption) attack to decrypt SSL sessions and access the plaintext of encrypted connections. Network Time Protocol (NTP) Project NTP daemon (ntpd) is vulnerable to a denial of service, caused by an error when using symmetric key authentication. By sending specially crafted packets to both peering hosts, an attacker could exploit this vulnerability to prevent synchronization. The TLS protocol could allow a remote attacker to obtain sensitive information, caused by the failure to properly convey a DHE_EXPORT ciphersuite choice. An attacker could exploit this vulnerability using man-in-the-middle techniques to force a downgrade to 512-bit export-grade cipher. Successful exploitation could allow an attacker to recover the session key as well as modify the contents of the traffic. This vulnerability is commonly referred to as
    last seen2020-06-01
    modified2020-06-02
    plugin id87184
    published2015-12-04
    reporterThis script is Copyright (C) 2015 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/87184
    titleAIX 6.1 TL 9 : bos.net.tcp.client (U861500)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were extracted
    # from AIX Security PTF U861500. The text itself is copyright (C)
    # International Business Machines Corp.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(87184);
      script_version("$Revision: 2.4 $");
      script_cvs_date("$Date: 2015/12/19 18:41:38 $");
    
      script_cve_id("CVE-2015-4948", "CVE-2015-5722");
    
      script_name(english:"AIX 6.1 TL 9 : bos.net.tcp.client (U861500)");
      script_summary(english:"Check for PTF U861500");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote AIX host is missing a vendor-supplied security patch."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "The remote host is missing AIX PTF U861500, which is related to the
    security of the package bos.net.tcp.client.
    
    Product could allow a remote attacker to obtain sensitive information,
    caused by a design error when using the SSLv3 protocol. A remote user
    with the ability to conduct a man-in-the-middle attack could exploit
    this vulnerability via a POODLE (Padding Oracle On Downgraded Legacy
    Encryption) attack to decrypt SSL sessions and access the plaintext of
    encrypted connections.
    
    Network Time Protocol (NTP) Project NTP daemon (ntpd) is vulnerable to
    a denial of service, caused by an error when using symmetric key
    authentication. By sending specially crafted packets to both peering
    hosts, an attacker could exploit this vulnerability to prevent
    synchronization.
    
    The TLS protocol could allow a remote attacker to obtain sensitive
    information, caused by the failure to properly convey a DHE_EXPORT
    ciphersuite choice. An attacker could exploit this vulnerability using
    man-in-the-middle techniques to force a downgrade to 512-bit
    export-grade cipher. Successful exploitation could allow an attacker
    to recover the session key as well as modify the contents of the
    traffic. This vulnerability is commonly referred to as 'Logjam'.
    
    ISC BIND is vulnerable to a denial of service, caused by an error in
    the handling of TKEY queries. By sending specially crafted packets, a
    remote attacker could exploit this vulnerability to cause a REQUIRE
    assertion failure.
    
    IBM AIX could allow a local attacker to escalate their privileges to
    root access through a vulnerability in netstat when a fiber channel
    adapter is present.
    
    ISC BIND is vulnerable to a denial of service, caused by the exit of a
    validating resolver due to an assertion failure in buffer.c. By
    parsing a malformed DNSSEC key, a remote attacker could exploit this
    vulnerability to cause a denial of service."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://www-01.ibm.com/support/docview.wss?uid=isg1IV73417"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://www-01.ibm.com/support/docview.wss?uid=isg1IV73783"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://www-01.ibm.com/support/docview.wss?uid=isg1IV74916"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://www-01.ibm.com/support/docview.wss?uid=isg1IV74920"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://www-01.ibm.com/support/docview.wss?uid=isg1IV75643"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://www-01.ibm.com/support/docview.wss?uid=isg1IV75692"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://www-01.ibm.com/support/docview.wss?uid=isg1IV75940"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://www-01.ibm.com/support/docview.wss?uid=isg1IV78091"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Install the appropriate missing security-related fix."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:ibm:aix:6.1");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2015/05/20");
      script_set_attribute(attribute:"patch_publication_date", value:"2015/05/20");
      script_set_attribute(attribute:"plugin_publication_date", value:"2015/12/04");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2015 Tenable Network Security, Inc.");
      script_family(english:"AIX Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/AIX/oslevel", "Host/AIX/version", "Host/AIX/lslpp");
    
      exit(0);
    }
    
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("aix.inc");
    
    if ( ! get_kb_item("Host/local_checks_enabled") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if ( ! get_kb_item("Host/AIX/version") ) audit(AUDIT_OS_NOT, "AIX");
    if ( ! get_kb_item("Host/AIX/lslpp") ) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    flag = 0;
    
    if ( aix_check_patch(ml:"610009", patch:"U861500", package:"bos.net.tcp.client.6.1.9.100") < 0 ) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:aix_report_get());
      else security_hole(0);
      exit(0);
    }
    else audit(AUDIT_HOST_NOT, "affected");
    
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2015-15061.NASL
    descriptionFixed https://bugzilla.redhat.com/show_bug.cgi?id=1259690 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-05
    modified2015-10-05
    plugin id86259
    published2015-10-05
    reporterThis script is Copyright (C) 2015-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/86259
    titleFedora 21 : bind-9.9.6-11.P1.fc21 (2015-15061)
  • NASL familyDNS
    NASL idBIND9_9102_P4.NASL
    descriptionAccording to its self-reported version number, the installation of ISC BIND running on the remote name server is potentially affected by the following vulnerabilities : - A denial of service vulnerability exists due to an assertion flaw that is triggered when parsing malformed DNSSEC keys. An unauthenticated, remote attacker can exploit this, via a specially crafted query to a zone containing such a key, to cause a validating resolver to exit. (CVE-2015-5722) - A denial of service vulnerability exists in the fromwire_openpgpkey() function in openpgpkey_61.c that is triggered when the length of data is less than 1. An unauthenticated, remote attacker can exploit this, via a specially crafted response to a query, to cause an assertion failure that terminates named. (CVE-2015-5986) Note that Nessus has not tested for these issues but has instead relied only on the application
    last seen2020-06-01
    modified2020-06-02
    plugin id85896
    published2015-09-11
    reporterThis script is Copyright (C) 2015-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/85896
    titleISC BIND 9.0.x < 9.9.7-P3 / 9.10.x < 9.10.2-P4 Multiple DoS
  • NASL familyF5 Networks Local Security Checks
    NASL idF5_BIGIP_SOL17181.NASL
    descriptionParsing a malformed DNSSEC key can cause a validating resolver to exit due to a failed assertion in buffer.c. It is possible for a remote attacker to deliberately trigger this condition, for example by using a query which requires a response from a zone containing a deliberately malformed key. (CVE-2015-5722)
    last seen2020-06-01
    modified2020-06-02
    plugin id88814
    published2016-02-18
    reporterThis script is Copyright (C) 2016-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/88814
    titleF5 Networks BIG-IP : BIND vulnerability (K17181)
  • NASL familyAIX Local Security Checks
    NASL idAIX_IV78095.NASL
    descriptionISC BIND is vulnerable to a denial of service, caused by the exit of a validating resolver due to an assertion failure in buffer.c. By parsing a malformed DNSSEC key, a remote attacker could exploit this vulnerability to cause a denial of service.
    last seen2020-06-01
    modified2020-06-02
    plugin id86768
    published2015-11-06
    reporterThis script is Copyright (C) 2015 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/86768
    titleAIX 7.1 TL 3 : bind (IV78095)
  • NASL familyUbuntu Local Security Checks
    NASL idUBUNTU_USN-2728-1.NASL
    descriptionHanno Bock discovered that Bind incorrectly handled certain malformed keys when configured to perform DNSSEC validation. A remote attacker could use this issue with specially crafted zone data to cause Bind to crash, resulting in a denial of service. Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id85765
    published2015-09-03
    reporterUbuntu Security Notice (C) 2015-2019 Canonical, Inc. / NASL script (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/85765
    titleUbuntu 12.04 LTS / 14.04 LTS / 15.04 : bind9 vulnerability (USN-2728-1)
  • NASL familyCentOS Local Security Checks
    NASL idCENTOS_RHSA-2015-1705.NASL
    descriptionUpdated bind packages that fix one security issue are now available for Red Hat Enterprise Linux 6 and 7. Red Hat Product Security has rated this update as having Important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. A denial of service flaw was found in the way BIND parsed certain malformed DNSSEC keys. A remote attacker could use this flaw to send a specially crafted DNS query (for example, a query requiring a response from a zone containing a deliberately malformed key) that would cause named functioning as a validating resolver to crash. (CVE-2015-5722) Red Hat would like to thank ISC for reporting this issue. Upstream acknowledges Hanno Bock as the original reporter. All bind users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. After installing the update, the BIND daemon (named) will be restarted automatically.
    last seen2020-06-01
    modified2020-06-02
    plugin id86503
    published2015-10-22
    reporterThis script is Copyright (C) 2015-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/86503
    titleCentOS 6 / 7 : bind (CESA-2015:1705)
  • NASL familyAIX Local Security Checks
    NASL idAIX_U867672.NASL
    descriptionThe remote host is missing AIX PTF U867672, which is related to the security of the package bos.net.tcp.client. Product could allow a remote attacker to obtain sensitive information, caused by a design error when using the SSLv3 protocol. A remote user with the ability to conduct a man-in-the-middle attack could exploit this vulnerability via a POODLE (Padding Oracle On Downgraded Legacy Encryption) attack to decrypt SSL sessions and access the plaintext of encrypted connections. The TLS protocol could allow a remote attacker to obtain sensitive information, caused by the failure to properly convey a DHE_EXPORT ciphersuite choice. An attacker could exploit this vulnerability using man-in-the-middle techniques to force a downgrade to 512-bit export-grade cipher. Successful exploitation could allow an attacker to recover the session key as well as modify the contents of the traffic. This vulnerability is commonly referred to as
    last seen2020-06-01
    modified2020-06-02
    plugin id88994
    published2016-02-29
    reporterThis script is Copyright (C) 2016 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/88994
    titleAIX 7.1 TL 3 : bos.net.tcp.client (U867672)
  • NASL familyOracleVM Local Security Checks
    NASL idORACLEVM_OVMSA-2016-0055.NASL
    descriptionThe remote OracleVM system is missing necessary patches to address critical security updates : - Fix issue with patch for CVE-2016-1285 and CVE-2016-1286 found by test suite - Fix (CVE-2016-1285, CVE-2016-1286) - Fix (CVE-2015-8704) - Fix (CVE-2015-8000) - Fix (CVE-2015-5722) - Fix (CVE-2015-5477) - Remove files backup after patching (Related: #1171971) - Fix CVE-2014-8500 (#1171971) - fix race condition in socket module - fix (CVE-2012-5166) - bind-chroot-admin: set correct permissions on /etc/named.conf during update - fix (CVE-2012-4244) - fix (CVE-2012-3817) - fix (CVE-2012-1667) - fix (CVE-2012-1033)
    last seen2020-06-01
    modified2020-06-02
    plugin id91739
    published2016-06-22
    reporterThis script is Copyright (C) 2016-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/91739
    titleOracleVM 3.2 : bind (OVMSA-2016-0055)
  • NASL familyAIX Local Security Checks
    NASL idAIX_IV78091.NASL
    descriptionISC BIND is vulnerable to a denial of service, caused by the exit of a validating resolver due to an assertion failure in buffer.c. By parsing a malformed DNSSEC key, a remote attacker could exploit this vulnerability to cause a denial of service.
    last seen2020-06-01
    modified2020-06-02
    plugin id86765
    published2015-11-06
    reporterThis script is Copyright (C) 2015 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/86765
    titleAIX 6.1 TL 9 : bind (IV78091)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2015-1706.NASL
    descriptionUpdated bind packages that fix one security issue are now available for Red Hat Enterprise Linux 5. Red Hat Product Security has rated this update as having Important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. A denial of service flaw was found in the way BIND parsed certain malformed DNSSEC keys. A remote attacker could use this flaw to send a specially crafted DNS query (for example, a query requiring a response from a zone containing a deliberately malformed key) that would cause named functioning as a validating resolver to crash. (CVE-2015-5722) Red Hat would like to thank ISC for reporting this issue. Upstream acknowledges Hanno Bock as the original reporter. All bind users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. After installing the update, the BIND daemon (named) will be restarted automatically.
    last seen2020-06-01
    modified2020-06-02
    plugin id85971
    published2015-09-17
    reporterThis script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/85971
    titleRHEL 5 : bind (RHSA-2015:1706)
  • NASL familyOracleVM Local Security Checks
    NASL idORACLEVM_OVMSA-2015-0119.NASL
    descriptionThe remote OracleVM system is missing necessary patches to address critical security updates : - Apply previously not applied patch for (CVE-2015-5722) - Fix (CVE-2015-5722)
    last seen2020-06-01
    modified2020-06-02
    plugin id85783
    published2015-09-04
    reporterThis script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/85783
    titleOracleVM 3.3 : bind (OVMSA-2015-0119)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2015-15062.NASL
    descriptionrebase to 9.10.3rc1 due to https://bugzilla.redhat.com/show_bug.cgi?id=1259690 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-05
    modified2015-09-08
    plugin id85832
    published2015-09-08
    reporterThis script is Copyright (C) 2015-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/85832
    titleFedora 23 : bind-9.10.3-0.1.rc1.fc23 / bind-dyndb-ldap-8.0-3.fc23 / dnsperf-2.0.0.0-18.fc23 (2015-15062)
  • NASL familySuSE Local Security Checks
    NASL idOPENSUSE-2015-600.NASL
    descriptionBIND was updated to fix a denial of service against servers performing validation on DNSSEC-signed records (CVE-2015-5722, bsc#944066).
    last seen2020-06-05
    modified2015-09-23
    plugin id86093
    published2015-09-23
    reporterThis script is Copyright (C) 2015-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/86093
    titleopenSUSE Security Update : bind (openSUSE-2015-600)
  • NASL familySlackware Local Security Checks
    NASL idSLACKWARE_SSA_2015-245-01.NASL
    descriptionNew bind packages are available for Slackware 13.0, 13.1, 13.37, 14.0, 14.1, and -current to fix security issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id85746
    published2015-09-03
    reporterThis script is Copyright (C) 2015 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/85746
    titleSlackware 13.0 / 13.1 / 13.37 / 14.0 / 14.1 / current : bind (SSA:2015-245-01)
  • NASL familyAIX Local Security Checks
    NASL idAIX_IV78094.NASL
    descriptionISC BIND is vulnerable to a denial of service, caused by the exit of a validating resolver due to an assertion failure in buffer.c. By parsing a malformed DNSSEC key, a remote attacker could exploit this vulnerability to cause a denial of service.
    last seen2020-06-01
    modified2020-06-02
    plugin id86767
    published2015-11-06
    reporterThis script is Copyright (C) 2015 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/86767
    titleAIX 7.1 TL 2 : bind (IV78094)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2015-15041.NASL
    descriptionFixed https://bugzilla.redhat.com/show_bug.cgi?id=1259690 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-05
    modified2015-09-10
    plugin id85892
    published2015-09-10
    reporterThis script is Copyright (C) 2015-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/85892
    titleFedora 22 : bind-9.10.2-5.P4.fc22 (2015-15041)
  • NASL familyCentOS Local Security Checks
    NASL idCENTOS_RHSA-2015-1706.NASL
    descriptionUpdated bind packages that fix one security issue are now available for Red Hat Enterprise Linux 5. Red Hat Product Security has rated this update as having Important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. A denial of service flaw was found in the way BIND parsed certain malformed DNSSEC keys. A remote attacker could use this flaw to send a specially crafted DNS query (for example, a query requiring a response from a zone containing a deliberately malformed key) that would cause named functioning as a validating resolver to crash. (CVE-2015-5722) Red Hat would like to thank ISC for reporting this issue. Upstream acknowledges Hanno Bock as the original reporter. All bind users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. After installing the update, the BIND daemon (named) will be restarted automatically.
    last seen2020-06-01
    modified2020-06-02
    plugin id86504
    published2015-10-22
    reporterThis script is Copyright (C) 2015-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/86504
    titleCentOS 5 : bind (CESA-2015:1706)
  • NASL familyScientific Linux Local Security Checks
    NASL idSL_20150903_BIND97_ON_SL5_X.NASL
    descriptionA denial of service flaw was found in the way BIND parsed certain malformed DNSSEC keys. A remote attacker could use this flaw to send a specially crafted DNS query (for example, a query requiring a response from a zone containing a deliberately malformed key) that would cause named functioning as a validating resolver to crash. (CVE-2015-5722) After installing the update, the BIND daemon (named) will be restarted automatically.
    last seen2020-03-18
    modified2015-09-04
    plugin id85785
    published2015-09-04
    reporterThis script is Copyright (C) 2015-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/85785
    titleScientific Linux Security Update : bind97 on SL5.x i386/x86_64 (20150903)
  • NASL familyMacOS X Local Security Checks
    NASL idMACOSX_SERVER_5_0_15.NASL
    descriptionThe remote Mac OS X host has a version of OS X Server installed that is prior to 5.0.15. It is, therefore, affected by the following vulnerabilities : - A denial of service vulnerability exists due to an assertion flaw that is triggered when parsing malformed DNSSEC keys. An unauthenticated, remote attacker can exploit this, via a specially crafted query to a zone containing such a key, to cause a validating resolver to exit. (CVE-2015-5722) - A denial of service vulnerability exists in the fromwire_openpgpkey() function in openpgpkey_61.c that is triggered when the length of data is less than 1. An unauthenticated, remote attacker can exploit this, via a specially crafted response to a query, to cause an assertion failure that terminates named. (CVE-2015-5986) - A flaw exists in the web service component due to HTTP header field references missing from configuration files. A remote attacker can exploit this to bypass access restrictions. (CVE-2015-7031)
    last seen2020-06-01
    modified2020-06-02
    plugin id86604
    published2015-10-26
    reporterThis script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/86604
    titleMac OS X : OS X Server < 5.0.15 Multiple Vulnerabilities
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2015-1707.NASL
    descriptionUpdated bind97 packages that fix one security issue are now available for Red Hat Enterprise Linux 5. Red Hat Product Security has rated this update as having Important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. A denial of service flaw was found in the way BIND parsed certain malformed DNSSEC keys. A remote attacker could use this flaw to send a specially crafted DNS query (for example, a query requiring a response from a zone containing a deliberately malformed key) that would cause named functioning as a validating resolver to crash. (CVE-2015-5722) Red Hat would like to thank ISC for reporting this issue. Upstream acknowledges Hanno Bock as the original reporter. All bind97 users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. After installing the update, the BIND daemon (named) will be restarted automatically.
    last seen2020-06-01
    modified2020-06-02
    plugin id85972
    published2015-09-17
    reporterThis script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/85972
    titleRHEL 5 : bind97 (RHSA-2015:1707)
  • NASL familyScientific Linux Local Security Checks
    NASL idSL_20150903_BIND_ON_SL5_X.NASL
    descriptionA denial of service flaw was found in the way BIND parsed certain malformed DNSSEC keys. A remote attacker could use this flaw to send a specially crafted DNS query (for example, a query requiring a response from a zone containing a deliberately malformed key) that would cause named functioning as a validating resolver to crash. (CVE-2015-5722) After installing the update, the BIND daemon (named) will be restarted automatically.
    last seen2020-03-18
    modified2015-09-04
    plugin id85786
    published2015-09-04
    reporterThis script is Copyright (C) 2015-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/85786
    titleScientific Linux Security Update : bind on SL5.x i386/x86_64 (20150903)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2015-1705.NASL
    descriptionUpdated bind packages that fix one security issue are now available for Red Hat Enterprise Linux 6 and 7. Red Hat Product Security has rated this update as having Important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. A denial of service flaw was found in the way BIND parsed certain malformed DNSSEC keys. A remote attacker could use this flaw to send a specially crafted DNS query (for example, a query requiring a response from a zone containing a deliberately malformed key) that would cause named functioning as a validating resolver to crash. (CVE-2015-5722) Red Hat would like to thank ISC for reporting this issue. Upstream acknowledges Hanno Bock as the original reporter. All bind users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. After installing the update, the BIND daemon (named) will be restarted automatically.
    last seen2020-06-01
    modified2020-06-02
    plugin id85970
    published2015-09-17
    reporterThis script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/85970
    titleRHEL 6 / 7 : bind (RHSA-2015:1705)
  • NASL familyOracle Linux Local Security Checks
    NASL idORACLELINUX_ELSA-2015-1707.NASL
    descriptionFrom Red Hat Security Advisory 2015:1707 : Updated bind97 packages that fix one security issue are now available for Red Hat Enterprise Linux 5. Red Hat Product Security has rated this update as having Important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. A denial of service flaw was found in the way BIND parsed certain malformed DNSSEC keys. A remote attacker could use this flaw to send a specially crafted DNS query (for example, a query requiring a response from a zone containing a deliberately malformed key) that would cause named functioning as a validating resolver to crash. (CVE-2015-5722) Red Hat would like to thank ISC for reporting this issue. Upstream acknowledges Hanno Bock as the original reporter. All bind97 users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. After installing the update, the BIND daemon (named) will be restarted automatically.
    last seen2020-06-01
    modified2020-06-02
    plugin id85779
    published2015-09-04
    reporterThis script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/85779
    titleOracle Linux 5 : bind97 (ELSA-2015-1707)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_SU-2015-1480-1.NASL
    descriptionThe nameserver bind was updated to fix a remote denial of service (crash) attack against bind nameservers doing validation on DNSSEC signed records. (CVE-2015-5722, bsc#944066). Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id85793
    published2015-09-04
    reporterThis script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/85793
    titleSUSE SLED11 / SLES11 Security Update : bind (SUSE-SU-2015:1480-1)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2015-14958.NASL
    descriptionFixed https://bugzilla.redhat.com/show_bug.cgi?id=1259563 https://bugzilla.redhat.com/show_bug.cgi?id=1259691 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-05
    modified2015-09-25
    plugin id86129
    published2015-09-25
    reporterThis script is Copyright (C) 2015-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/86129
    titleFedora 22 : bind99-9.9.7-7.P3.fc22 (2015-14958)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2015-14954.NASL
    descriptionFixed https://bugzilla.redhat.com/show_bug.cgi?id=1259563 https://bugzilla.redhat.com/show_bug.cgi?id=1259691 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-05
    modified2015-09-08
    plugin id85831
    published2015-09-08
    reporterThis script is Copyright (C) 2015-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/85831
    titleFedora 23 : bind99-9.9.7-7.P3.fc23 (2015-14954)
  • NASL familyOracleVM Local Security Checks
    NASL idORACLEVM_OVMSA-2020-0021.NASL
    descriptionThe remote OracleVM system is missing necessary patches to address critical security updates : please see Oracle VM Security Advisory OVMSA-2020-0021 for details.
    last seen2020-06-10
    modified2020-06-05
    plugin id137170
    published2020-06-05
    reporterThis script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/137170
    titleOracleVM 3.3 / 3.4 : bind (OVMSA-2020-0021)
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DLA-308.NASL
    descriptionHanno B&ouml;ck from the Fuzzing Project discovered that incorrect validation of DNSSEC-signed records in the Bind DNS server could result in denial of service. For Debian 6
    last seen2020-03-17
    modified2015-09-10
    plugin id85888
    published2015-09-10
    reporterThis script is Copyright (C) 2015-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/85888
    titleDebian DLA-308-1 : bind9 security update
  • NASL familyOracle Linux Local Security Checks
    NASL idORACLELINUX_ELSA-2015-1706.NASL
    descriptionFrom Red Hat Security Advisory 2015:1706 : Updated bind packages that fix one security issue are now available for Red Hat Enterprise Linux 5. Red Hat Product Security has rated this update as having Important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. A denial of service flaw was found in the way BIND parsed certain malformed DNSSEC keys. A remote attacker could use this flaw to send a specially crafted DNS query (for example, a query requiring a response from a zone containing a deliberately malformed key) that would cause named functioning as a validating resolver to crash. (CVE-2015-5722) Red Hat would like to thank ISC for reporting this issue. Upstream acknowledges Hanno Bock as the original reporter. All bind users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. After installing the update, the BIND daemon (named) will be restarted automatically.
    last seen2020-06-01
    modified2020-06-02
    plugin id85778
    published2015-09-04
    reporterThis script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/85778
    titleOracle Linux 5 : bind (ELSA-2015-1706)
  • NASL familyOracle Linux Local Security Checks
    NASL idORACLELINUX_ELSA-2015-1705.NASL
    descriptionFrom Red Hat Security Advisory 2015:1705 : Updated bind packages that fix one security issue are now available for Red Hat Enterprise Linux 6 and 7. Red Hat Product Security has rated this update as having Important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. A denial of service flaw was found in the way BIND parsed certain malformed DNSSEC keys. A remote attacker could use this flaw to send a specially crafted DNS query (for example, a query requiring a response from a zone containing a deliberately malformed key) that would cause named functioning as a validating resolver to crash. (CVE-2015-5722) Red Hat would like to thank ISC for reporting this issue. Upstream acknowledges Hanno Bock as the original reporter. All bind users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. After installing the update, the BIND daemon (named) will be restarted automatically.
    last seen2020-06-01
    modified2020-06-02
    plugin id85777
    published2015-09-04
    reporterThis script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/85777
    titleOracle Linux 6 / 7 : bind (ELSA-2015-1705)
  • NASL familyGentoo Local Security Checks
    NASL idGENTOO_GLSA-201510-01.NASL
    descriptionThe remote host is affected by the vulnerability described in GLSA-201510-01 (BIND: Denial of Service) A vulnerability has been discovered in BIND&rsquo;s named utility leading to a Denial of Service condition. Impact : A remote attacker may be able to cause Denial of Service condition via specially constructed zone data. Workaround : There is no known workaround at this time.
    last seen2020-06-01
    modified2020-06-02
    plugin id86435
    published2015-10-19
    reporterThis script is Copyright (C) 2015 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/86435
    titleGLSA-201510-01 : BIND: Denial of Service
  • NASL familySuSE Local Security Checks
    NASL idSUSE_SU-2015-1496-1.NASL
    descriptionThe nameserver bind was updated to fix a remote denial of service (crash) attack against bind nameservers doing validation on DNSSEC signed records. (CVE-2015-5722, bsc#944066). Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id85841
    published2015-09-08
    reporterThis script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/85841
    titleSUSE SLES11 Security Update : bind (SUSE-SU-2015:1496-1)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_SU-2015-1481-1.NASL
    descriptionThe nameserver bind was updated to fix a remote denial of service (crash) attack against bind nameservers doing validation on DNSSEC signed records. (CVE-2015-5722, bsc#944066). Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id85794
    published2015-09-04
    reporterThis script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/85794
    titleSUSE SLED12 / SLES12 Security Update : bind (SUSE-SU-2015:1481-1)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2016-0079.NASL
    descriptionUpdated bind packages that fix three security issues are now available for Red Hat Enterprise Linux 6.6 Extended Update Support. Red Hat Product Security has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. A flaw was found in the way BIND handled requests for TKEY DNS resource records. A remote attacker could use this flaw to make named (functioning as an authoritative DNS server or a DNS resolver) exit unexpectedly with an assertion failure via a specially crafted DNS request packet. (CVE-2015-5477) A denial of service flaw was found in the way BIND parsed certain malformed DNSSEC keys. A remote attacker could use this flaw to send a specially crafted DNS query (for example, a query requiring a response from a zone containing a deliberately malformed key) that would cause named functioning as a validating resolver to crash. (CVE-2015-5722) A denial of service flaw was found in the way BIND processed certain records with malformed class attributes. A remote attacker could use this flaw to send a query to request a cached record with a malformed class attribute that would cause named functioning as an authoritative or recursive server to crash. (CVE-2015-8000) Note: This issue affects authoritative servers as well as recursive servers, however authoritative servers are at limited risk if they perform authentication when making recursive queries to resolve addresses for servers listed in NS RRSETs. Red Hat would like to thank ISC for reporting the CVE-2015-5477, CVE-2015-5722, and CVE-2015-8000 issues. Upstream acknowledges Jonathan Foote as the original reporter of CVE-2015-5477, and Hanno Bock as the original reporter of CVE-2015-5722. All bind users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. After installing the update, the BIND daemon (named) will be restarted automatically.
    last seen2020-06-01
    modified2020-06-02
    plugin id88480
    published2016-01-29
    reporterThis script is Copyright (C) 2016-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/88480
    titleRHEL 6 : bind (RHSA-2016:0079)
  • NASL familyAIX Local Security Checks
    NASL idAIX_IV78092.NASL
    descriptionISC BIND is vulnerable to a denial of service, caused by the exit of a validating resolver due to an assertion failure in buffer.c. By parsing a malformed DNSSEC key, a remote attacker could exploit this vulnerability to cause a denial of service.
    last seen2020-06-01
    modified2020-06-02
    plugin id86766
    published2015-11-06
    reporterThis script is Copyright (C) 2015 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/86766
    titleAIX 5.3 TL 12 : bind (IV78092)
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-3350.NASL
    descriptionHanno Boeck discovered that incorrect validation of DNSSEC-signed records in the Bind DNS server could result in denial of service. Updates for the oldstable distribution (wheezy) will be released shortly.
    last seen2020-06-01
    modified2020-06-02
    plugin id85756
    published2015-09-03
    reporterThis script is Copyright (C) 2015-2018 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/85756
    titleDebian DSA-3350-1 : bind9 - security update
  • NASL familyScientific Linux Local Security Checks
    NASL idSL_20150903_BIND_ON_SL6_X.NASL
    descriptionA denial of service flaw was found in the way BIND parsed certain malformed DNSSEC keys. A remote attacker could use this flaw to send a specially crafted DNS query (for example, a query requiring a response from a zone containing a deliberately malformed key) that would cause named functioning as a validating resolver to crash. (CVE-2015-5722) After installing the update, the BIND daemon (named) will be restarted automatically.
    last seen2020-03-18
    modified2015-09-04
    plugin id85787
    published2015-09-04
    reporterThis script is Copyright (C) 2015-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/85787
    titleScientific Linux Security Update : bind on SL6.x, SL7.x i386/x86_64 (20150903)
  • NASL familyOracleVM Local Security Checks
    NASL idORACLEVM_OVMSA-2017-0066.NASL
    descriptionThe remote OracleVM system is missing necessary patches to address critical security updates : - Fix CVE-2017-3136 (ISC change 4575) - Fix CVE-2017-3137 (ISC change 4578) - Fix and test caching CNAME before DNAME (ISC change 4558) - Fix CVE-2016-9147 (ISC change 4510) - Fix regression introduced by CVE-2016-8864 (ISC change 4530) - Restore SELinux contexts before named restart - Use /lib or /lib64 only if directory in chroot already exists - Tighten NSS library pattern, escape chroot mount path - Fix (CVE-2016-8864) - Do not change lib permissions in chroot (#1321239) - Support WKS records in chroot (#1297562) - Do not include patch backup in docs (fixes #1325081 patch) - Backported relevant parts of [RT #39567] (#1259923) - Increase ISC_SOCKET_MAXEVENTS to 2048 (#1326283) - Fix multiple realms in nsupdate script like upstream (#1313286) - Fix multiple realm in nsupdate script (#1313286) - Use resolver-query-timeout high enough to recover all forwarders (#1325081) - Fix (CVE-2016-2848) - Fix infinite loop in start_lookup (#1306504) - Fix (CVE-2016-2776)
    last seen2020-06-01
    modified2020-06-02
    plugin id99569
    published2017-04-21
    reporterThis script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/99569
    titleOracleVM 3.3 / 3.4 : bind (OVMSA-2017-0066)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2016-0078.NASL
    descriptionUpdated bind packages that fix multiple security issues are now available for Red Hat Enterprise Linux 6.4 and 6.5 Advanced Update Support. Red Hat Product Security has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. A denial of service flaw was found in the way BIND followed DNS delegations. A remote attacker could use a specially crafted zone containing a large number of referrals which, when looked up and processed, would cause named to use excessive amounts of memory or crash. (CVE-2014-8500) A flaw was found in the way BIND handled requests for TKEY DNS resource records. A remote attacker could use this flaw to make named (functioning as an authoritative DNS server or a DNS resolver) exit unexpectedly with an assertion failure via a specially crafted DNS request packet. (CVE-2015-5477) A denial of service flaw was found in the way BIND parsed certain malformed DNSSEC keys. A remote attacker could use this flaw to send a specially crafted DNS query (for example, a query requiring a response from a zone containing a deliberately malformed key) that would cause named functioning as a validating resolver to crash. (CVE-2015-5722) A denial of service flaw was found in the way BIND processed certain records with malformed class attributes. A remote attacker could use this flaw to send a query to request a cached record with a malformed class attribute that would cause named functioning as an authoritative or recursive server to crash. (CVE-2015-8000) Note: This issue affects authoritative servers as well as recursive servers, however authoritative servers are at limited risk if they perform authentication when making recursive queries to resolve addresses for servers listed in NS RRSETs. Red Hat would like to thank ISC for reporting the CVE-2015-5477, CVE-2015-5722, and CVE-2015-8000 issues. Upstream acknowledges Jonathan Foote as the original reporter of CVE-2015-5477, and Hanno Bock as the original reporter of CVE-2015-5722. All bind users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. After installing the update, the BIND daemon (named) will be restarted automatically.
    last seen2020-06-01
    modified2020-06-02
    plugin id88479
    published2016-01-29
    reporterThis script is Copyright (C) 2016-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/88479
    titleRHEL 6 : bind (RHSA-2016:0078)
  • NASL familyCentOS Local Security Checks
    NASL idCENTOS_RHSA-2015-1707.NASL
    descriptionUpdated bind97 packages that fix one security issue are now available for Red Hat Enterprise Linux 5. Red Hat Product Security has rated this update as having Important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. A denial of service flaw was found in the way BIND parsed certain malformed DNSSEC keys. A remote attacker could use this flaw to send a specially crafted DNS query (for example, a query requiring a response from a zone containing a deliberately malformed key) that would cause named functioning as a validating resolver to crash. (CVE-2015-5722) Red Hat would like to thank ISC for reporting this issue. Upstream acknowledges Hanno Bock as the original reporter. All bind97 users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. After installing the update, the BIND daemon (named) will be restarted automatically.
    last seen2020-06-01
    modified2020-06-02
    plugin id86505
    published2015-10-22
    reporterThis script is Copyright (C) 2015-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/86505
    titleCentOS 5 : bind97 (CESA-2015:1707)
  • NASL familyHuawei Local Security Checks
    NASL idEULEROS_SA-2019-1433.NASL
    descriptionAccording to the versions of the bind packages installed, the EulerOS Virtualization installation on the remote host is affected by the following vulnerabilities : - A denial of service flaw was found in the way BIND constructed a response to a query that met certain criteria. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS request packet.(CVE-2016-2776) - A denial of service flaw was found in the way BIND processed certain control channel input. A remote attacker able to send a malformed packet to the control channel could use this flaw to cause named to crash.(CVE-2016-1285) - A flaw was found in the way BIND performed DNSSEC validation. An attacker able to make BIND (functioning as a DNS resolver with DNSSEC validation enabled) resolve a name in an attacker-controlled domain could cause named to exit unexpectedly with an assertion failure.(CVE-2015-4620) - A flaw was found in the way BIND handled requests for TKEY DNS resource records. A remote attacker could use this flaw to make named (functioning as an authoritative DNS server or a DNS resolver) exit unexpectedly with an assertion failure via a specially crafted DNS request packet.(CVE-2015-5477) - A denial of service flaw was found in the way BIND handled queries for NSEC3-signed zones. A remote attacker could use this flaw against an authoritative name server that served NCES3-signed zones by sending a specially crafted query, which, when processed, would cause named to crash.(CVE-2014-0591) - A denial of service flaw was found in the way BIND parsed certain malformed DNSSEC keys. A remote attacker could use this flaw to send a specially crafted DNS query (for example, a query requiring a response from a zone containing a deliberately malformed key) that would cause named functioning as a validating resolver to crash.(CVE-2015-5722) - It was found that the lightweight resolver protocol implementation in BIND could enter an infinite recursion and crash when asked to resolve a query name which, when combined with a search list entry, exceeds the maximum allowable length. A remote attacker could use this flaw to crash lwresd or named when using the
    last seen2020-06-01
    modified2020-06-02
    plugin id124936
    published2019-05-14
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/124936
    titleEulerOS Virtualization 3.0.1.0 : bind (EulerOS-SA-2019-1433)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_SU-2016-0227-1.NASL
    descriptionThis update for bind fixes the following issues : CVE-2015-8000: Remote denial of service by mis-parsing incoming responses. (bsc#958861) CVE-2015-5722: DoS against servers performing validation on DNSSEC-signed records. (bsc#944066) CVE-2015-5477: DoS against authoritative and recursive servers. CVE-2015-8704: Specific APL data could trigger a crash. (bsc#962189) Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id88178
    published2016-01-26
    reporterThis script is Copyright (C) 2016-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/88178
    titleSUSE SLES10 Security Update : bind (SUSE-SU-2016:0227-1)

Redhat

advisories
  • bugzilla
    id1259087
    titleCVE-2015-5722 bind: malformed DNSSEC key failed assertion denial of service
    oval
    OR
    • commentRed Hat Enterprise Linux must be installed
      ovaloval:com.redhat.rhba:tst:20070304026
    • AND
      • commentRed Hat Enterprise Linux 6 is installed
        ovaloval:com.redhat.rhba:tst:20111656003
      • OR
        • AND
          • commentbind-utils is earlier than 32:9.8.2-0.37.rc1.el6_7.4
            ovaloval:com.redhat.rhsa:tst:20151705001
          • commentbind-utils is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhba:tst:20170651012
        • AND
          • commentbind-libs is earlier than 32:9.8.2-0.37.rc1.el6_7.4
            ovaloval:com.redhat.rhsa:tst:20151705003
          • commentbind-libs is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhba:tst:20170651010
        • AND
          • commentbind is earlier than 32:9.8.2-0.37.rc1.el6_7.4
            ovaloval:com.redhat.rhsa:tst:20151705005
          • commentbind is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhba:tst:20170651006
        • AND
          • commentbind-chroot is earlier than 32:9.8.2-0.37.rc1.el6_7.4
            ovaloval:com.redhat.rhsa:tst:20151705007
          • commentbind-chroot is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhba:tst:20170651008
        • AND
          • commentbind-sdb is earlier than 32:9.8.2-0.37.rc1.el6_7.4
            ovaloval:com.redhat.rhsa:tst:20151705009
          • commentbind-sdb is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhba:tst:20170651002
        • AND
          • commentbind-devel is earlier than 32:9.8.2-0.37.rc1.el6_7.4
            ovaloval:com.redhat.rhsa:tst:20151705011
          • commentbind-devel is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhba:tst:20170651004
    • AND
      • commentRed Hat Enterprise Linux 7 is installed
        ovaloval:com.redhat.rhba:tst:20150364027
      • OR
        • AND
          • commentbind-utils is earlier than 32:9.9.4-18.el7_1.5
            ovaloval:com.redhat.rhsa:tst:20151705014
          • commentbind-utils is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhba:tst:20170651012
        • AND
          • commentbind-libs is earlier than 32:9.9.4-18.el7_1.5
            ovaloval:com.redhat.rhsa:tst:20151705015
          • commentbind-libs is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhba:tst:20170651010
        • AND
          • commentbind-libs-lite is earlier than 32:9.9.4-18.el7_1.5
            ovaloval:com.redhat.rhsa:tst:20151705016
          • commentbind-libs-lite is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhba:tst:20171767024
        • AND
          • commentbind-chroot is earlier than 32:9.9.4-18.el7_1.5
            ovaloval:com.redhat.rhsa:tst:20151705018
          • commentbind-chroot is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhba:tst:20170651008
        • AND
          • commentbind is earlier than 32:9.9.4-18.el7_1.5
            ovaloval:com.redhat.rhsa:tst:20151705019
          • commentbind is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhba:tst:20170651006
        • AND
          • commentbind-license is earlier than 32:9.9.4-18.el7_1.5
            ovaloval:com.redhat.rhsa:tst:20151705020
          • commentbind-license is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhba:tst:20171767022
        • AND
          • commentbind-lite-devel is earlier than 32:9.9.4-18.el7_1.5
            ovaloval:com.redhat.rhsa:tst:20151705022
          • commentbind-lite-devel is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhba:tst:20171767016
        • AND
          • commentbind-devel is earlier than 32:9.9.4-18.el7_1.5
            ovaloval:com.redhat.rhsa:tst:20151705024
          • commentbind-devel is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhba:tst:20170651004
        • AND
          • commentbind-sdb is earlier than 32:9.9.4-18.el7_1.5
            ovaloval:com.redhat.rhsa:tst:20151705025
          • commentbind-sdb is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhba:tst:20170651002
        • AND
          • commentbind-sdb-chroot is earlier than 32:9.9.4-18.el7_1.5
            ovaloval:com.redhat.rhsa:tst:20151705026
          • commentbind-sdb-chroot is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhba:tst:20171767018
    rhsa
    idRHSA-2015:1705
    released2015-09-03
    severityImportant
    titleRHSA-2015:1705: bind security update (Important)
  • bugzilla
    id1259087
    titleCVE-2015-5722 bind: malformed DNSSEC key failed assertion denial of service
    oval
    OR
    • commentRed Hat Enterprise Linux must be installed
      ovaloval:com.redhat.rhba:tst:20070304026
    • AND
      • commentRed Hat Enterprise Linux 5 is installed
        ovaloval:com.redhat.rhba:tst:20070331005
      • OR
        • AND
          • commentcaching-nameserver is earlier than 30:9.3.6-25.P1.el5_11.4
            ovaloval:com.redhat.rhsa:tst:20151706001
          • commentcaching-nameserver is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhsa:tst:20070057004
        • AND
          • commentbind-chroot is earlier than 30:9.3.6-25.P1.el5_11.4
            ovaloval:com.redhat.rhsa:tst:20151706003
          • commentbind-chroot is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhsa:tst:20070057008
        • AND
          • commentbind-devel is earlier than 30:9.3.6-25.P1.el5_11.4
            ovaloval:com.redhat.rhsa:tst:20151706005
          • commentbind-devel is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhsa:tst:20070057012
        • AND
          • commentbind-libbind-devel is earlier than 30:9.3.6-25.P1.el5_11.4
            ovaloval:com.redhat.rhsa:tst:20151706007
          • commentbind-libbind-devel is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhsa:tst:20070057006
        • AND
          • commentbind-utils is earlier than 30:9.3.6-25.P1.el5_11.4
            ovaloval:com.redhat.rhsa:tst:20151706009
          • commentbind-utils is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhsa:tst:20070057014
        • AND
          • commentbind-libs is earlier than 30:9.3.6-25.P1.el5_11.4
            ovaloval:com.redhat.rhsa:tst:20151706011
          • commentbind-libs is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhsa:tst:20070057002
        • AND
          • commentbind is earlier than 30:9.3.6-25.P1.el5_11.4
            ovaloval:com.redhat.rhsa:tst:20151706013
          • commentbind is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhsa:tst:20070057016
        • AND
          • commentbind-sdb is earlier than 30:9.3.6-25.P1.el5_11.4
            ovaloval:com.redhat.rhsa:tst:20151706015
          • commentbind-sdb is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhsa:tst:20070057010
    rhsa
    idRHSA-2015:1706
    released2015-09-03
    severityImportant
    titleRHSA-2015:1706: bind security update (Important)
  • bugzilla
    id1259087
    titleCVE-2015-5722 bind: malformed DNSSEC key failed assertion denial of service
    oval
    OR
    • commentRed Hat Enterprise Linux must be installed
      ovaloval:com.redhat.rhba:tst:20070304026
    • AND
      • commentRed Hat Enterprise Linux 5 is installed
        ovaloval:com.redhat.rhba:tst:20070331005
      • OR
        • AND
          • commentbind97-utils is earlier than 32:9.7.0-21.P2.el5_11.3
            ovaloval:com.redhat.rhsa:tst:20151707001
          • commentbind97-utils is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhsa:tst:20110845004
        • AND
          • commentbind97-libs is earlier than 32:9.7.0-21.P2.el5_11.3
            ovaloval:com.redhat.rhsa:tst:20151707003
          • commentbind97-libs is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhsa:tst:20110845008
        • AND
          • commentbind97-chroot is earlier than 32:9.7.0-21.P2.el5_11.3
            ovaloval:com.redhat.rhsa:tst:20151707005
          • commentbind97-chroot is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhsa:tst:20110845010
        • AND
          • commentbind97 is earlier than 32:9.7.0-21.P2.el5_11.3
            ovaloval:com.redhat.rhsa:tst:20151707007
          • commentbind97 is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhsa:tst:20110845002
        • AND
          • commentbind97-devel is earlier than 32:9.7.0-21.P2.el5_11.3
            ovaloval:com.redhat.rhsa:tst:20151707009
          • commentbind97-devel is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhsa:tst:20110845006
    rhsa
    idRHSA-2015:1707
    released2015-09-03
    severityImportant
    titleRHSA-2015:1707: bind97 security update (Important)
  • rhsa
    idRHSA-2016:0078
  • rhsa
    idRHSA-2016:0079
rpms
  • bind-32:9.8.2-0.37.rc1.el6_7.4
  • bind-32:9.9.4-18.ael7b_1.5
  • bind-32:9.9.4-18.el7_1.5
  • bind-chroot-32:9.8.2-0.37.rc1.el6_7.4
  • bind-chroot-32:9.9.4-18.ael7b_1.5
  • bind-chroot-32:9.9.4-18.el7_1.5
  • bind-debuginfo-32:9.8.2-0.37.rc1.el6_7.4
  • bind-debuginfo-32:9.9.4-18.ael7b_1.5
  • bind-debuginfo-32:9.9.4-18.el7_1.5
  • bind-devel-32:9.8.2-0.37.rc1.el6_7.4
  • bind-devel-32:9.9.4-18.ael7b_1.5
  • bind-devel-32:9.9.4-18.el7_1.5
  • bind-libs-32:9.8.2-0.37.rc1.el6_7.4
  • bind-libs-32:9.9.4-18.ael7b_1.5
  • bind-libs-32:9.9.4-18.el7_1.5
  • bind-libs-lite-32:9.9.4-18.ael7b_1.5
  • bind-libs-lite-32:9.9.4-18.el7_1.5
  • bind-license-32:9.9.4-18.ael7b_1.5
  • bind-license-32:9.9.4-18.el7_1.5
  • bind-lite-devel-32:9.9.4-18.ael7b_1.5
  • bind-lite-devel-32:9.9.4-18.el7_1.5
  • bind-sdb-32:9.8.2-0.37.rc1.el6_7.4
  • bind-sdb-32:9.9.4-18.ael7b_1.5
  • bind-sdb-32:9.9.4-18.el7_1.5
  • bind-sdb-chroot-32:9.9.4-18.ael7b_1.5
  • bind-sdb-chroot-32:9.9.4-18.el7_1.5
  • bind-utils-32:9.8.2-0.37.rc1.el6_7.4
  • bind-utils-32:9.9.4-18.ael7b_1.5
  • bind-utils-32:9.9.4-18.el7_1.5
  • bind-30:9.3.6-25.P1.el5_11.4
  • bind-chroot-30:9.3.6-25.P1.el5_11.4
  • bind-debuginfo-30:9.3.6-25.P1.el5_11.4
  • bind-devel-30:9.3.6-25.P1.el5_11.4
  • bind-libbind-devel-30:9.3.6-25.P1.el5_11.4
  • bind-libs-30:9.3.6-25.P1.el5_11.4
  • bind-sdb-30:9.3.6-25.P1.el5_11.4
  • bind-utils-30:9.3.6-25.P1.el5_11.4
  • caching-nameserver-30:9.3.6-25.P1.el5_11.4
  • bind97-32:9.7.0-21.P2.el5_11.3
  • bind97-chroot-32:9.7.0-21.P2.el5_11.3
  • bind97-debuginfo-32:9.7.0-21.P2.el5_11.3
  • bind97-devel-32:9.7.0-21.P2.el5_11.3
  • bind97-libs-32:9.7.0-21.P2.el5_11.3
  • bind97-utils-32:9.7.0-21.P2.el5_11.3
  • bind-32:9.8.2-0.17.rc1.el6_4.7
  • bind-32:9.8.2-0.23.rc1.el6_5.2
  • bind-chroot-32:9.8.2-0.17.rc1.el6_4.7
  • bind-chroot-32:9.8.2-0.23.rc1.el6_5.2
  • bind-debuginfo-32:9.8.2-0.17.rc1.el6_4.7
  • bind-debuginfo-32:9.8.2-0.23.rc1.el6_5.2
  • bind-devel-32:9.8.2-0.17.rc1.el6_4.7
  • bind-devel-32:9.8.2-0.23.rc1.el6_5.2
  • bind-libs-32:9.8.2-0.17.rc1.el6_4.7
  • bind-libs-32:9.8.2-0.23.rc1.el6_5.2
  • bind-sdb-32:9.8.2-0.17.rc1.el6_4.7
  • bind-sdb-32:9.8.2-0.23.rc1.el6_5.2
  • bind-utils-32:9.8.2-0.17.rc1.el6_4.7
  • bind-utils-32:9.8.2-0.23.rc1.el6_5.2
  • bind-32:9.8.2-0.30.rc1.el6_6.4
  • bind-chroot-32:9.8.2-0.30.rc1.el6_6.4
  • bind-debuginfo-32:9.8.2-0.30.rc1.el6_6.4
  • bind-devel-32:9.8.2-0.30.rc1.el6_6.4
  • bind-libs-32:9.8.2-0.30.rc1.el6_6.4
  • bind-sdb-32:9.8.2-0.30.rc1.el6_6.4
  • bind-utils-32:9.8.2-0.30.rc1.el6_6.4

References