Lucene search

K
archlinuxArch LinuxASA-201509-2
HistorySep 03, 2015 - 12:00 a.m.

bind: denial of service

2015-09-0300:00:00
Arch Linux
lists.archlinux.org
30

EPSS

0.966

Percentile

99.6%

  • CVE-2015-5722 (Parsing malformed keys may cause BIND to exit due to a
    failed assertion in buffer.c):

Parsing a malformed DNSSEC key can cause a validating resolver to exit
due to a failed assertion in buffer.c. It is possible for a remote
attacker to deliberately trigger this condition, for example by using a
query which requires a response from a zone containing a deliberately
malformed key.

  • CVE-2015-5986 (An incorrect boundary check can trigger a REQUIRE
    assertion failure in openpgpkey_61.c):

An incorrect boundary check in openpgpkey_61.c can cause named to
terminate due to a REQUIRE assertion failure. This defect can be
deliberately exploited by an attacker who can provide a maliciously
constructed response in answer to a query.

OSVersionArchitecturePackageVersionFilename
anyanyanybind< 9.10.2.P4-1UNKNOWN