[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DLA 370-1] bind9 security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Package        : bind9
Version        : 1:9.7.3.dfsg-1~squeeze18
CVE ID         : CVE-2015-8000

It was discovered that the BIND DNS server does not properly handle the
parsing of incoming responses, allowing some records with an incorrect
class to be accepted by BIND instead of being rejected as malformed.
This can trigger a REQUIRE assertion failure when those records are
subsequently cached. A remote attacker can exploit this flaw to cause a
denial of service against servers performing recursive queries.

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
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=Erox
-----END PGP SIGNATURE-----


Reply to: