Scientific Linux Security Update : bind on SL6.x i386/x86_64 (20130328)

High Nessus Plugin ID 65762

New! Vulnerability Priority Rating (VPR)

Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it's different from CVSS.

VPR Score: 3.6

Synopsis

The remote Scientific Linux host is missing one or more security updates.

Description

A denial of service flaw was found in the libdns library. A remote attacker could use this flaw to send a specially crafted DNS query to named that, when processed, would cause named to use an excessive amount of memory, or possibly crash. (CVE-2013-2266)

Note: This update disables the syntax checking of NAPTR (Naming Authority Pointer) resource records.

This update also fixes the following bug :

- Previously, rebuilding the bind-dyndb-ldap source RPM failed with a '/usr/include/dns/view.h:76:21: error:
dns/rrl.h: No such file or directory' error.

After installing the update, the BIND daemon (named) will be restarted automatically.

Solution

Update the affected packages.

See Also

http://www.nessus.org/u?5e394c0a

Plugin Details

Severity: High

ID: 65762

File Name: sl_20130328_bind_on_SL6_x.nasl

Version: 1.8

Type: local

Agent: unix

Published: 2013/04/01

Updated: 2020/09/24

Dependencies: 12634

Risk Information

Risk Factor: High

VPR Score: 3.6

CVSS v2.0

Base Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Information

CPE: p-cpe:/a:fermilab:scientific_linux:bind, p-cpe:/a:fermilab:scientific_linux:bind-chroot, p-cpe:/a:fermilab:scientific_linux:bind-debuginfo, p-cpe:/a:fermilab:scientific_linux:bind-devel, p-cpe:/a:fermilab:scientific_linux:bind-libs, p-cpe:/a:fermilab:scientific_linux:bind-sdb, p-cpe:/a:fermilab:scientific_linux:bind-utils, x-cpe:/o:fermilab:scientific_linux

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/RedHat/release, Host/RedHat/rpm-list

Patch Publication Date: 2013/03/28

Vulnerability Publication Date: 2013/03/28

Reference Information

CVE: CVE-2013-2266