Lucene search

K
redhatRedHatRHSA-2016:0601
HistoryApr 06, 2016 - 12:00 a.m.

(RHSA-2016:0601) Important: bind security update

2016-04-0600:00:00
access.redhat.com
23

0.733 High

EPSS

Percentile

98.1%

The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name
System (DNS) protocols. BIND includes a DNS server (named); a resolver library
(routines for applications to use when interfacing with DNS); and tools for
verifying that the DNS server is operating correctly.

Security Fix(es):

  • A denial of service flaw was found in the way BIND parsed signature records
    for DNAME records. By sending a specially crafted query, a remote attacker could
    use this flaw to cause named to crash. (CVE-2016-1286)

  • A denial of service flaw was found in the way BIND processed certain control
    channel input. A remote attacker able to send a malformed packet to the control
    channel could use this flaw to cause named to crash. (CVE-2016-1285)

Red Hat would like to thank ISC for reporting these issues.