Lucene search

K
redhatRedHatRHSA-2016:2099
HistoryOct 25, 2016 - 7:38 a.m.

(RHSA-2016:2099) Important: bind security update

2016-10-2507:38:10
access.redhat.com
24

0.972 High

EPSS

Percentile

99.8%

The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.

Security Fix(es):

  • A denial of service flaw was found in the way BIND constructed a response to a query that met certain criteria. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS request packet. (CVE-2016-2776)

  • A denial of service flaw was found in the way BIND handled packets with malformed options. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS packet. (CVE-2016-2848)

Red Hat would like to thank ISC for reporting CVE-2016-2776.