This script is Copyright (C) 2015 Tenable Network Security, Inc.
The remote Scientific Linux host is missing one or more security
A flaw was found in the way BIND handled requests for TKEY DNS
resource records. A remote attacker could use this flaw to make named
(functioning as an authoritative DNS server or a DNS resolver) exit
unexpectedly with an assertion failure via a specially crafted DNS
request packet. (CVE-2015-5477)
After installing the update, the BIND daemon (named) will be restarted
See also :
Update the affected packages.
Risk factor :
High / CVSS Base Score : 7.8
Public Exploit Available : true