Mandriva Linux Security Advisory : bind (MDVSA-2012:177)

High Nessus Plugin ID 63161


The remote Mandriva Linux host is missing one or more security updates.


A vulnerability was discovered and corrected in bind :

BIND 9 nameservers using the DNS64 IPv6 transition mechanism are vulnerable to a software defect that allows a crafted query to crash the server with a REQUIRE assertion failure. Remote exploitation of this defect can be achieved without extensive effort, resulting in a denial-of-service (DoS) vector against affected servers (CVE-2012-5688).

The updated packages have been upgraded to bind 9.8.4-P1 which is not vulnerable to this issue.


Update the affected packages.

See Also

Plugin Details

Severity: High

ID: 63161

File Name: mandriva_MDVSA-2012-177.nasl

Version: $Revision: 1.10 $

Type: local

Published: 2012/12/06

Modified: 2014/01/30

Dependencies: 12634

Risk Information

Risk Factor: High


Base Score: 7.8

Temporal Score: 6.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:bind, p-cpe:/a:mandriva:linux:bind-devel, p-cpe:/a:mandriva:linux:bind-doc, p-cpe:/a:mandriva:linux:bind-utils, cpe:/o:mandriva:linux:2011

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2012/12/05

Reference Information

CVE: CVE-2012-5688

BID: 56817

MDVSA: 2012:177