CentOS 5 : bind (CESA-2009:1179)

medium Nessus Plugin ID 43772

Language:

Synopsis

The remote CentOS host is missing one or more security updates.

Description

Updated bind packages that fix a security issue are now available for Red Hat Enterprise Linux 5.

This update has been rated as having important security impact by the Red Hat Security Response Team.

[Updated 29th July 2009] The packages in this erratum have been updated to also correct this issue in the bind-sdb package.

The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.

A flaw was found in the way BIND handles dynamic update message packets containing the 'ANY' record type. A remote attacker could use this flaw to send a specially crafted dynamic update packet that could cause named to exit with an assertion failure. (CVE-2009-0696)

Note: even if named is not configured for dynamic updates, receiving such a specially crafted dynamic update packet could still cause named to exit unexpectedly.

All BIND users are advised to upgrade to these updated packages, which contain a backported patch to resolve this issue. After installing the update, the BIND daemon (named) will be restarted automatically.

Solution

Update the affected bind packages.

See Also

http://www.nessus.org/u?659ff874

http://www.nessus.org/u?1c9a7a16

Plugin Details

Severity: Medium

ID: 43772

File Name: centos_RHSA-2009-1179.nasl

Version: 1.20

Type: local

Agent: unix

Published: 1/6/2010

Updated: 1/4/2021

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Agentless Assessment, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.1

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.6

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P

Vulnerability Information

CPE: p-cpe:/a:centos:centos:caching-nameserver, p-cpe:/a:centos:centos:bind-utils, p-cpe:/a:centos:centos:bind-libbind-devel, p-cpe:/a:centos:centos:bind-devel, p-cpe:/a:centos:centos:bind-sdb, p-cpe:/a:centos:centos:bind, p-cpe:/a:centos:centos:bind-chroot, cpe:/o:centos:centos:5, p-cpe:/a:centos:centos:bind-libs

Required KB Items: Host/local_checks_enabled, Host/CentOS/release, Host/CentOS/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 7/29/2009

Vulnerability Publication Date: 7/29/2009

Exploitable With

Core Impact

Reference Information

CVE: CVE-2009-0696

BID: 35848

CWE: 16

RHSA: 2009:1179