BIND: Multiple vulnerabilities
Multiple vulnerabilities have been found in BIND, the worst of
which may allow remote Denial of Service.
bind
2012-09-24
2012-09-24
402661
419637
427966
434876
remote
9.9.1_p3
9.9.1_p3
BIND is the Berkeley Internet Name Domain Server.
Multiple vulnerabilities have been discovered in BIND:
- Domain names are not properly revoked due to an error in the cache
update policy (CVE-2012-1033).
- BIND accepts records with zero-length RDATA fields (CVE-2012-1667).
- An assertion failure from the failing-query cache could occur when
DNSSEC validation is enabled (CVE-2012-3817).
- A memory leak may occur under high TCP query loads (CVE-2012-3868).
- An assertion error can occur when a query is performed for a record
with RDATA greater than 65535 bytes (CVE-2012-4244).
A remote attacker may be able to cause a Denial of Service condition or
keep domain names resolvable after it has been deleted from registration.
There is no known workaround at this time.
All BIND users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-dns/bind-9.9.1_p3"
CVE-2012-1033
CVE-2012-1667
CVE-2012-3817
CVE-2012-3868
CVE-2012-4244
craig
ackle