This script is Copyright (C) 2010-2014 Tenable Network Security, Inc.
The remote Mandriva Linux host is missing one or more security
Multiple vulnerabilities were discovered and corrected in bind :
named in ISC BIND 9.6.2 before 9.6.2-P3, 9.6-ESV before 9.6-ESV-R3,
and 9.7.x before 9.7.2-P3 does not properly handle the combination of
signed negative responses and corresponding RRSIG records in the
cache, which allows remote attackers to cause a denial of service
(daemon crash) via a query for cached data (CVE-2010-3613).
named in ISC BIND 9.x before 9.6.2-P3, 9.7.x before 9.7.2-P3, 9.4-ESV
before 9.4-ESV-R4, and 9.6-ESV before 9.6-ESV-R3 does not properly
determine the security status of an NS RRset during a DNSKEY algorithm
rollover, which might allow remote attackers to cause a denial of
service (DNSSEC validation error) by triggering a rollover
ISC BIND before 9.7.2-P2, when DNSSEC validation is enabled, does not
properly handle certain bad signatures if multiple trust anchors exist
for a single zone, which allows remote attackers to cause a denial of
service (daemon crash) via a DNS query (CVE-2010-3762).
Packages for 2009.0 are provided as of the Extended Maintenance
Program. Please visit this link to learn more:
The updated packages for Corporate Server 4.0 has been patched to
address these issues.
The updated packages for Mandriva Linux 2009.0, 2010.0 and Mandriva
Linux Enterprise Server 5.1 has been upgraded to bind-9.6.2-P3 and
patched to address the CVE-2010-3762 security issue.
The updated packages for Mandriva Linux 2010.1 has been upgraded to
bind-9.7.2-P3 which is not vulnerable to these issues.
Update the affected packages.
Risk factor :
Medium / CVSS Base Score : 6.4
CVSS Temporal Score : 5.6
Public Exploit Available : true