Executive Summary

Summary
Titlebind security update
Informations
NameRHSA-2011:1458First vendor Publication2011-11-17
VendorRedHatLast vendor Modification2011-11-17
Severity (Vendor) ImportantRevision01

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:N/I:N/A:P)
Cvss Base Score5Attack RangeNetwork
Cvss Impact Score2.9Attack ComplexityLow
Cvss Expoit Score10AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Detail

Problem Description:

Updated bind packages that fix one security issue are now available for Red Hat Enterprise Linux 5 and 6.

The Red Hat Security Response Team has rated this update as having important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section.

2. Relevant releases/architectures:

RHEL Desktop Workstation (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64

3. Description:

The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.

A flaw was discovered in the way BIND handled certain DNS queries, which caused it to cache an invalid record. A remote attacker could use this flaw to send repeated queries for this invalid record, causing the resolvers to exit unexpectedly due to a failed assertion. (CVE-2011-4313)

Users of bind are advised to upgrade to these updated packages, which resolve this issue. After installing the update, the BIND daemon (named) will be restarted automatically.

4. Solution:

Before applying this update, make sure all previously-released errata relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259

5. Bugs fixed (http://bugzilla.redhat.com/):

754398 - CVE-2011-4313 bind: Remote denial of service against recursive servers via logging negative cache entry

Original Source

Url : https://rhn.redhat.com/errata/RHSA-2011-1458.html

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:22113
 
Oval ID: oval:org.mitre.oval:def:22113
Title: RHSA-2011:1458: bind security update (Important)
Description: query.c in ISC BIND 9.0.x through 9.6.x, 9.4-ESV through 9.4-ESV-R5, 9.6-ESV through 9.6-ESV-R5, 9.7.0 through 9.7.4, 9.8.0 through 9.8.1, and 9.9.0a1 through 9.9.0b1 allows remote attackers to cause a denial of service (assertion failure and named exit) via unknown vectors related to recursive DNS queries, error logging, and the caching of an invalid record by the resolver.
Family: unix Class: patch
Reference(s): RHSA-2011:1458-01
CESA-2011:1458
CVE-2011-4313
Version: 4
Platform(s): Red Hat Enterprise Linux 5
Red Hat Enterprise Linux 6
CentOS Linux 5
CentOS Linux 6
Product(s): bind
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:21944
 
Oval ID: oval:org.mitre.oval:def:21944
Title: RHSA-2011:1459: bind97 security update (Important)
Description: query.c in ISC BIND 9.0.x through 9.6.x, 9.4-ESV through 9.4-ESV-R5, 9.6-ESV through 9.6-ESV-R5, 9.7.0 through 9.7.4, 9.8.0 through 9.8.1, and 9.9.0a1 through 9.9.0b1 allows remote attackers to cause a denial of service (assertion failure and named exit) via unknown vectors related to recursive DNS queries, error logging, and the caching of an invalid record by the resolver.
Family: unix Class: patch
Reference(s): RHSA-2011:1459-01
CESA-2011:1459
CVE-2011-4313
Version: 4
Platform(s): Red Hat Enterprise Linux 5
CentOS Linux 5
Product(s): bind97
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:20072
 
Oval ID: oval:org.mitre.oval:def:20072
Title: Multiple vulnerabilities in AIX BIND
Description: query.c in ISC BIND 9.0.x through 9.6.x, 9.4-ESV through 9.4-ESV-R5, 9.6-ESV through 9.6-ESV-R5, 9.7.0 through 9.7.4, 9.8.0 through 9.8.1, and 9.9.0a1 through 9.9.0b1 allows remote attackers to cause a denial of service (assertion failure and named exit) via unknown vectors related to recursive DNS queries, error logging, and the caching of an invalid record by the resolver.
Family: unix Class: vulnerability
Reference(s): CVE-2011-4313
Version: 4
Platform(s): IBM AIX 6.1
IBM AIX 7.1
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:15365
 
Oval ID: oval:org.mitre.oval:def:15365
Title: USN-1264-1 -- Bind vulnerability
Description: bind9: Internet Domain Name Server Bind could be made to crash if it received specially crafted network traffic.
Family: unix Class: patch
Reference(s): USN-1264-1
CVE-2011-4313
Version: 7
Platform(s): Ubuntu 11.04
Ubuntu 11.10
Ubuntu 8.04
Ubuntu 10.04
Ubuntu 10.10
Product(s): Bind
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:15046
 
Oval ID: oval:org.mitre.oval:def:15046
Title: DSA-2347-1 bind9 -- improper assert
Description: It was discovered that BIND, a DNS server, crashes while processing certain sequences of recursive DNS queries, leading to a denial of service. Authoritative-only server configurations are not affected by this issue.
Family: unix Class: patch
Reference(s): DSA-2347-1
CVE-2011-4313
Version: 7
Platform(s): Debian GNU/Linux 5.0
Debian GNU/Linux 6.0
Debian GNU/kFreeBSD 6.0
Product(s): bind9
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:14343
 
Oval ID: oval:org.mitre.oval:def:14343
Title: HP-UX Running BIND, Remote Denial of Service (DoS)
Description: query.c in ISC BIND 9.0.x through 9.6.x, 9.4-ESV through 9.4-ESV-R5, 9.6-ESV through 9.6-ESV-R5, 9.7.0 through 9.7.4, 9.8.0 through 9.8.1, and 9.9.0a1 through 9.9.0b1 allows remote attackers to cause a denial of service (assertion failure and named exit) via unknown vectors related to recursive DNS queries, error logging, and the caching of an invalid record by the resolver.
Family: unix Class: vulnerability
Reference(s): CVE-2011-4313
Version: 7
Platform(s): HP-UX 11
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:23684
 
Oval ID: oval:org.mitre.oval:def:23684
Title: ELSA-2011:1458: bind security update (Important)
Description: query.c in ISC BIND 9.0.x through 9.6.x, 9.4-ESV through 9.4-ESV-R5, 9.6-ESV through 9.6-ESV-R5, 9.7.0 through 9.7.4, 9.8.0 through 9.8.1, and 9.9.0a1 through 9.9.0b1 allows remote attackers to cause a denial of service (assertion failure and named exit) via unknown vectors related to recursive DNS queries, error logging, and the caching of an invalid record by the resolver.
Family: unix Class: patch
Reference(s): ELSA-2011:1458-01
CVE-2011-4313
Version: 6
Platform(s): Oracle Linux 5
Oracle Linux 6
Product(s): bind
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:23397
 
Oval ID: oval:org.mitre.oval:def:23397
Title: DEPRECATED: ELSA-2011:1458: bind security update (Important)
Description: query.c in ISC BIND 9.0.x through 9.6.x, 9.4-ESV through 9.4-ESV-R5, 9.6-ESV through 9.6-ESV-R5, 9.7.0 through 9.7.4, 9.8.0 through 9.8.1, and 9.9.0a1 through 9.9.0b1 allows remote attackers to cause a denial of service (assertion failure and named exit) via unknown vectors related to recursive DNS queries, error logging, and the caching of an invalid record by the resolver.
Family: unix Class: patch
Reference(s): ELSA-2011:1458-01
CVE-2011-4313
Version: 7
Platform(s): Oracle Linux 5
Oracle Linux 6
Product(s): bind
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:23322
 
Oval ID: oval:org.mitre.oval:def:23322
Title: ELSA-2011:1459: bind97 security update (Important)
Description: query.c in ISC BIND 9.0.x through 9.6.x, 9.4-ESV through 9.4-ESV-R5, 9.6-ESV through 9.6-ESV-R5, 9.7.0 through 9.7.4, 9.8.0 through 9.8.1, and 9.9.0a1 through 9.9.0b1 allows remote attackers to cause a denial of service (assertion failure and named exit) via unknown vectors related to recursive DNS queries, error logging, and the caching of an invalid record by the resolver.
Family: unix Class: patch
Reference(s): ELSA-2011:1459-01
CVE-2011-4313
Version: 6
Platform(s): Oracle Linux 5
Product(s): bind97
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:28078
 
Oval ID: oval:org.mitre.oval:def:28078
Title: ELSA-2011-1458 -- bind security update (important)
Description: [32:9.7.3-2.3.P3] - fix DOS against recursive servers (#754398) [32:9.7.3-2.2.P3] - update to 9.7.3-P3 (CVE-2011-2464) [32:9.7.3-2.1.P1] - update to 9.7.3-P1 (CVE-2011-1910)
Family: unix Class: patch
Reference(s): ELSA-2011-1458
CVE-2011-4313
Version: 3
Platform(s): Oracle Linux 5
Oracle Linux 6
Product(s): bind
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:27896
 
Oval ID: oval:org.mitre.oval:def:27896
Title: ELSA-2011-1459 -- bind97 security update (important)
Description: [32:9.7.0-6.P2.4] - fix DOS against recursive servers (#754398)
Family: unix Class: patch
Reference(s): ELSA-2011-1459
CVE-2011-4313
Version: 3
Platform(s): Oracle Linux 5
Product(s): bind97
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application192

OpenVAS Exploits

DateDescription
2012-12-31Name : Fedora Update for bind FEDORA-2012-19822
File : nvt/gb_fedora_2012_19822_bind_fc16.nasl
2012-10-23Name : Fedora Update for bind FEDORA-2012-15981
File : nvt/gb_fedora_2012_15981_bind_fc16.nasl
2012-10-03Name : Fedora Update for bind FEDORA-2012-14030
File : nvt/gb_fedora_2012_14030_bind_fc16.nasl
2012-08-14Name : Fedora Update for bind FEDORA-2012-11153
File : nvt/gb_fedora_2012_11153_bind_fc16.nasl
2012-08-10Name : Gentoo Security Advisory GLSA 201206-01 (bind)
File : nvt/glsa_201206_01.nasl
2012-07-30Name : CentOS Update for bind CESA-2011:1458 centos5 x86_64
File : nvt/gb_CESA-2011_1458_bind_centos5_x86_64.nasl
2012-07-30Name : CentOS Update for bind97 CESA-2011:1459 centos5 x86_64
File : nvt/gb_CESA-2011_1459_bind97_centos5_x86_64.nasl
2012-07-30Name : CentOS Update for bind CESA-2011:1496 centos4 x86_64
File : nvt/gb_CESA-2011_1496_bind_centos4_x86_64.nasl
2012-06-19Name : Fedora Update for bind FEDORA-2012-8946
File : nvt/gb_fedora_2012_8946_bind_fc16.nasl
2012-06-19Name : Fedora Update for bind FEDORA-2012-8962
File : nvt/gb_fedora_2012_8962_bind_fc15.nasl
2012-04-02Name : Fedora Update for bind FEDORA-2011-16057
File : nvt/gb_fedora_2011_16057_bind_fc16.nasl
2012-02-11Name : Debian Security Advisory DSA 2347-1 (bind9)
File : nvt/deb_2347_1.nasl
2011-12-02Name : RedHat Update for bind RHSA-2011:1496-01
File : nvt/gb_RHSA-2011_1496-01_bind.nasl
2011-12-02Name : CentOS Update for bind CESA-2011:1496 centos4 i386
File : nvt/gb_CESA-2011_1496_bind_centos4_i386.nasl
2011-11-28Name : Fedora Update for bind FEDORA-2011-16002
File : nvt/gb_fedora_2011_16002_bind_fc14.nasl
2011-11-28Name : Fedora Update for bind FEDORA-2011-16036
File : nvt/gb_fedora_2011_16036_bind_fc15.nasl
2011-11-21Name : CentOS Update for bind CESA-2011:1458 centos5 i386
File : nvt/gb_CESA-2011_1458_bind_centos5_i386.nasl
2011-11-21Name : CentOS Update for bind97 CESA-2011:1459 centos5 i386
File : nvt/gb_CESA-2011_1459_bind97_centos5_i386.nasl
2011-11-21Name : Mandriva Update for bind MDVSA-2011:176-2 (bind)
File : nvt/gb_mandriva_MDVSA_2011_176_2.nasl
2011-11-18Name : Ubuntu Update for bind9 USN-1264-1
File : nvt/gb_ubuntu_USN_1264_1.nasl
2011-11-18Name : RedHat Update for bind RHSA-2011:1458-01
File : nvt/gb_RHSA-2011_1458-01_bind.nasl
2011-11-18Name : RedHat Update for bind97 RHSA-2011:1459-01
File : nvt/gb_RHSA-2011_1459-01_bind97.nasl
2011-11-18Name : Mandriva Update for bind MDVSA-2011:176 (bind)
File : nvt/gb_mandriva_MDVSA_2011_176.nasl
2011-11-18Name : Mandriva Update for bind MDVSA-2011:176-1 (bind)
File : nvt/gb_mandriva_MDVSA_2011_176_1.nasl
0000-00-00Name : FreeBSD Ports: bind96
File : nvt/freebsd_bind960.nasl

Open Source Vulnerability Database (OSVDB)

idDescription
77159ISC BIND Recursive Query Parsing Remote DoS

Nessus® Vulnerability Scanner

DateDescription
2014-10-10Name : The remote device is missing a vendor-supplied security patch.
File : f5_bigip_SOL14204.nasl - Type : ACT_GATHER_INFO
2014-06-13Name : The remote openSUSE host is missing a security update.
File : suse_11_3_bind-111117.nasl - Type : ACT_GATHER_INFO
2014-06-13Name : The remote openSUSE host is missing a security update.
File : openSUSE-2011-13.nasl - Type : ACT_GATHER_INFO
2014-06-13Name : The remote openSUSE host is missing a security update.
File : suse_11_4_bind-111117.nasl - Type : ACT_GATHER_INFO
2013-09-04Name : The remote Amazon Linux AMI host is missing a security update.
File : ala_ALAS-2011-24.nasl - Type : ACT_GATHER_INFO
2013-07-12Name : The remote Oracle Linux host is missing one or more security updates.
File : oraclelinux_ELSA-2011-1458.nasl - Type : ACT_GATHER_INFO
2013-07-12Name : The remote Oracle Linux host is missing one or more security updates.
File : oraclelinux_ELSA-2011-1459.nasl - Type : ACT_GATHER_INFO
2013-07-12Name : The remote Oracle Linux host is missing one or more security updates.
File : oraclelinux_ELSA-2011-1496.nasl - Type : ACT_GATHER_INFO
2013-01-24Name : The remote AIX host is missing a security patch.
File : aix_IV09491.nasl - Type : ACT_GATHER_INFO
2013-01-24Name : The remote AIX host is missing a security patch.
File : aix_IV09978.nasl - Type : ACT_GATHER_INFO
2013-01-24Name : The remote AIX host is missing a security patch.
File : aix_IV10049.nasl - Type : ACT_GATHER_INFO
2013-01-24Name : The remote AIX host is missing a security patch.
File : aix_IV11742.nasl - Type : ACT_GATHER_INFO
2013-01-24Name : The remote AIX host is missing a security patch.
File : aix_IV11743.nasl - Type : ACT_GATHER_INFO
2013-01-24Name : The remote AIX host is missing a security patch.
File : aix_IV11744.nasl - Type : ACT_GATHER_INFO
2012-09-20Name : The remote host is missing a Mac OS X update that fixes several security issues.
File : macosx_10_7_5.nasl - Type : ACT_GATHER_INFO
2012-09-20Name : The remote host is missing a Mac OS X update that fixes several security issues.
File : macosx_10_8_2.nasl - Type : ACT_GATHER_INFO
2012-08-01Name : The remote Scientific Linux host is missing one or more security updates.
File : sl_20111117_bind97_on_SL5_x.nasl - Type : ACT_GATHER_INFO
2012-08-01Name : The remote Scientific Linux host is missing one or more security updates.
File : sl_20111117_bind_on_SL5_x.nasl - Type : ACT_GATHER_INFO
2012-08-01Name : The remote Scientific Linux host is missing one or more security updates.
File : sl_20111129_bind_on_SL4_x.nasl - Type : ACT_GATHER_INFO
2012-06-21Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201206-01.nasl - Type : ACT_GATHER_INFO
2012-03-06Name : The remote HP-UX host is missing a security-related patch.
File : hpux_PHNE_42727.nasl - Type : ACT_GATHER_INFO
2011-12-13Name : The remote SuSE 10 host is missing a security-related patch.
File : suse_bind-7851.nasl - Type : ACT_GATHER_INFO
2011-12-13Name : The remote SuSE 11 host is missing one or more security updates.
File : suse_11_bind-111121.nasl - Type : ACT_GATHER_INFO
2011-11-30Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2011-1496.nasl - Type : ACT_GATHER_INFO
2011-11-30Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2011-1496.nasl - Type : ACT_GATHER_INFO
2011-11-28Name : The remote Fedora host is missing a security update.
File : fedora_2011-16002.nasl - Type : ACT_GATHER_INFO
2011-11-28Name : The remote Fedora host is missing a security update.
File : fedora_2011-16036.nasl - Type : ACT_GATHER_INFO
2011-11-22Name : The remote Fedora host is missing a security update.
File : fedora_2011-16057.nasl - Type : ACT_GATHER_INFO
2011-11-22Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2011-1458.nasl - Type : ACT_GATHER_INFO
2011-11-22Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2011-1459.nasl - Type : ACT_GATHER_INFO
2011-11-18Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2011-1458.nasl - Type : ACT_GATHER_INFO
2011-11-18Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2011-1459.nasl - Type : ACT_GATHER_INFO
2011-11-17Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-1264-1.nasl - Type : ACT_GATHER_INFO
2011-11-17Name : The remote FreeBSD host is missing one or more security-related updates.
File : freebsd_pkg_90cc149410ac11e1b3ec0024e830109b.nasl - Type : ACT_GATHER_INFO
2011-11-17Name : The remote Mandriva Linux host is missing one or more security updates.
File : mandriva_MDVSA-2011-176.nasl - Type : ACT_GATHER_INFO
2011-11-17Name : The remote Debian host is missing a security-related update.
File : debian_DSA-2347.nasl - Type : ACT_GATHER_INFO
2011-11-17Name : The remote name server may be affected by a denial of service vulnerability.
File : bind9_981_p1.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
DateInformations
2014-02-17 11:55:18
  • Multiple Updates