Lucene search

K
mageiaGentoo FoundationMGASA-2015-0272
HistoryJul 09, 2015 - 11:09 a.m.

Updated bind package fixes security vulnerability

2015-07-0911:09:20
Gentoo Foundation
advisories.mageia.org
25

CVSS2

7.8

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

EPSS

0.157

Percentile

96.0%

A recursive resolver that is performing DNSSEC validation can be deliberately terminated by any attacker who can cause a query to be performed against a maliciously constructed zone. This will result in a denial of service to clients who rely on that resolver (CVE-2015-4620). Note that DNSSEC validation is not enabled by default.

OSVersionArchitecturePackageVersionFilename
Mageia4noarchbind< 9.9.7.P1-1bind-9.9.7.P1-1.mga4
Mageia5noarchbind< 9.10.2.P2-1bind-9.10.2.P2-1.mga5

CVSS2

7.8

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

EPSS

0.157

Percentile

96.0%