Búsqueda de    
Vulnerabilidad   
    Buscar 219043 Descripciones CVE y
99761 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.871396
Categoría:Red Hat Local Security Checks
Título:RedHat Update for bind RHSA-2015:1471-01
Resumen:The remote host is missing an update for the 'bind'; package(s) announced via the referenced advisory.
Descripción:Summary:
The remote host is missing an update for the 'bind'
package(s) announced via the referenced advisory.

Vulnerability Insight:
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain
Name System (DNS) protocols. BIND includes a DNS server (named) a resolver
library (routines for applications to use when interfacing with DNS) and
tools for verifying that the DNS server is operating correctly.

A flaw was found in the way BIND performed DNSSEC validation. An attacker
able to make BIND (functioning as a DNS resolver with DNSSEC validation
enabled) resolve a name in an attacker-controlled domain could cause named
to exit unexpectedly with an assertion failure. (CVE-2015-4620)

Red Hat would like to thank ISC for reporting this issue.

All bind users are advised to upgrade to these updated packages, which
contain a backported patch to correct this issue. After installing the
update, the BIND daemon (named) will be restarted automatically.

Affected Software/OS:
bind on Red Hat Enterprise Linux Desktop (v. 6),
Red Hat Enterprise Linux Server (v. 6),
Red Hat Enterprise Linux Workstation (v. 6)

Solution:
Please Install the Updated Packages.

CVSS Score:
7.8

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:C

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2015-4620
BugTraq ID: 75588
http://www.securityfocus.com/bid/75588
Debian Security Information: DSA-3304 (Google Search)
http://www.debian.org/security/2015/dsa-3304
http://lists.fedoraproject.org/pipermail/package-announce/2015-July/162040.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-July/162286.html
https://security.gentoo.org/glsa/201510-01
HPdes Security Advisory: HPSBUX03379
http://marc.info/?l=bugtraq&m=143740940810833&w=2
HPdes Security Advisory: SSRT101976
RedHat Security Advisories: RHSA-2015:1443
http://rhn.redhat.com/errata/RHSA-2015-1443.html
RedHat Security Advisories: RHSA-2015:1471
http://rhn.redhat.com/errata/RHSA-2015-1471.html
http://www.securitytracker.com/id/1032799
SuSE Security Announcement: SUSE-SU-2015:1205 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00013.html
SuSE Security Announcement: openSUSE-SU-2015:1250 (Google Search)
http://lists.opensuse.org/opensuse-updates/2015-07/msg00038.html
SuSE Security Announcement: openSUSE-SU-2015:1326 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00050.html
http://www.ubuntu.com/usn/USN-2669-1
CopyrightCopyright (C) 2015 Greenbone Networks GmbH

Esta es sólo una de 99761 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2024 E-Soft Inc. Todos los derechos reservados.