Executive Summary

Summary
Title bind security update
Informations
Name RHSA-2017:0276 First vendor Publication 2017-02-15
Vendor RedHat Last vendor Modification 2017-02-15
Severity (Vendor) N/A Revision 01

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:N/I:N/A:P)
Cvss Base Score 4.3 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Problem Description:

An update for bind is now available for Red Hat Enterprise Linux 7.

Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux Client (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - noarch, x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Server (v. 7) - aarch64, noarch, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - aarch64, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64

3. Description:

The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.

Security Fix(es):

* A denial of service flaw was found in the way BIND handled query responses when both DNS64 and RPZ were used. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure or a null pointer dereference via a specially crafted DNS response. (CVE-2017-3135)

Red Hat would like to thank ISC for reporting this issue. Upstream acknowledges Ramesh Damodaran (Infoblox) and Aliaksandr Shubnik (Infoblox) as the original reporter.

4. Solution:

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

After installing the update, the BIND daemon (named) will be restarted automatically.

5. Bugs fixed (https://bugzilla.redhat.com/):

1420193 - CVE-2017-3135 bind: Assertion failure when using DNS64 and RPZ Can Lead to Crash

Original Source

Url : https://rhn.redhat.com/errata/RHSA-2017-0276.html

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-476 NULL Pointer Dereference

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 17
Application 1
Application 1
Os 2
Os 1
Os 1
Os 3
Os 4
Os 2
Os 1

Nessus® Vulnerability Scanner

Date Description
2017-08-17 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201708-01.nasl - Type : ACT_GATHER_INFO
2017-07-31 Name : The remote device is affected by a denial of service vulnerability.
File : juniper_jsa10799.nasl - Type : ACT_GATHER_INFO
2017-07-13 Name : The remote Virtuozzo host is missing a security update.
File : Virtuozzo_VZLSA-2017-0276.nasl - Type : ACT_GATHER_INFO
2017-05-01 Name : The remote EulerOS host is missing multiple security updates.
File : EulerOS_SA-2017-1026.nasl - Type : ACT_GATHER_INFO
2017-05-01 Name : The remote EulerOS host is missing multiple security updates.
File : EulerOS_SA-2017-1025.nasl - Type : ACT_GATHER_INFO
2017-03-07 Name : The remote openSUSE host is missing a security update.
File : openSUSE-2017-314.nasl - Type : ACT_GATHER_INFO
2017-03-06 Name : The remote Fedora host is missing a security update.
File : fedora_2017-d0c9bf9508.nasl - Type : ACT_GATHER_INFO
2017-03-06 Name : The remote Fedora host is missing a security update.
File : fedora_2017-96b7f4f53e.nasl - Type : ACT_GATHER_INFO
2017-03-03 Name : The remote SUSE host is missing one or more security updates.
File : suse_SU-2017-0596-1.nasl - Type : ACT_GATHER_INFO
2017-03-03 Name : The remote SUSE host is missing one or more security updates.
File : suse_SU-2017-0595-1.nasl - Type : ACT_GATHER_INFO
2017-03-03 Name : The remote SUSE host is missing one or more security updates.
File : suse_SU-2017-0594-1.nasl - Type : ACT_GATHER_INFO
2017-03-01 Name : The remote Debian host is missing a security update.
File : debian_DLA-843.nasl - Type : ACT_GATHER_INFO
2017-02-27 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-3795.nasl - Type : ACT_GATHER_INFO
2017-02-23 Name : The remote device is missing a vendor-supplied security patch.
File : f5_bigip_SOL80533167.nasl - Type : ACT_GATHER_INFO
2017-02-21 Name : The remote Fedora host is missing a security update.
File : fedora_2017-27099c270a.nasl - Type : ACT_GATHER_INFO
2017-02-17 Name : The remote Ubuntu host is missing a security-related patch.
File : ubuntu_USN-3201-1.nasl - Type : ACT_GATHER_INFO
2017-02-17 Name : The remote name server is affected by a denial of service vulnerability.
File : bind9_CVE-2017-3135.nasl - Type : ACT_GATHER_INFO
2017-02-16 Name : The remote Scientific Linux host is missing one or more security updates.
File : sl_20170215_bind_on_SL7_x.nasl - Type : ACT_GATHER_INFO
2017-02-16 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2017-0276.nasl - Type : ACT_GATHER_INFO
2017-02-16 Name : The remote Oracle Linux host is missing one or more security updates.
File : oraclelinux_ELSA-2017-0276.nasl - Type : ACT_GATHER_INFO
2017-02-16 Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2017-0276.nasl - Type : ACT_GATHER_INFO
2017-02-15 Name : The remote Fedora host is missing a security update.
File : fedora_2017-2b46c8b6c2.nasl - Type : ACT_GATHER_INFO
2017-02-13 Name : The remote Slackware host is missing a security update.
File : Slackware_SSA_2017-041-01.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
Date Informations
2019-02-09 00:21:16
  • Multiple Updates
2019-01-17 17:21:10
  • Multiple Updates
2017-07-14 13:24:51
  • Multiple Updates
2017-02-17 13:26:42
  • Multiple Updates
2017-02-15 17:21:30
  • First insertion