SynopsisThe remote Mandriva Linux host is missing one or more security updates.
DescriptionUpdated bind packages fix security vulnerabilities :
By making use of maliciously-constructed zones or a rogue server, an attacker can exploit an oversight in the code BIND 9 uses to follow delegations in the Domain Name Service, causing BIND to issue unlimited queries in an attempt to follow the delegation. This can lead to resource exhaustion and denial of service (up to and including termination of the named server process) (CVE-2014-8500).
Jan-Piet Mens discovered that the BIND DNS server would crash when processing an invalid DNSSEC key rollover, either due to an error on the zone operator's part, or due to interference with network traffic by an attacker. This issue affects configurations with the directives 'dnssec-lookaside auto;' (as enabled in the Mandriva default configuration) or 'dnssec-validation auto;' (CVE-2015-1349).
SolutionUpdate the affected packages.