Mandriva Linux Security Advisory : bind (MDVSA-2012:177)

high Nessus Plugin ID 63161

Synopsis

The remote Mandriva Linux host is missing one or more security updates.

Description

A vulnerability was discovered and corrected in bind :

BIND 9 nameservers using the DNS64 IPv6 transition mechanism are vulnerable to a software defect that allows a crafted query to crash the server with a REQUIRE assertion failure. Remote exploitation of this defect can be achieved without extensive effort, resulting in a denial-of-service (DoS) vector against affected servers (CVE-2012-5688).

The updated packages have been upgraded to bind 9.8.4-P1 which is not vulnerable to this issue.

Solution

Update the affected packages.

See Also

ftp://ftp.isc.org/isc/bind9/9.8.4-P1/CHANGES

https://kb.isc.org/docs/aa-00828

Plugin Details

Severity: High

ID: 63161

File Name: mandriva_MDVSA-2012-177.nasl

Version: 1.15

Type: local

Published: 12/6/2012

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: High

Base Score: 7.8

Temporal Score: 5.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:bind, p-cpe:/a:mandriva:linux:bind-devel, p-cpe:/a:mandriva:linux:bind-doc, p-cpe:/a:mandriva:linux:bind-utils, cpe:/o:mandriva:linux:2011

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 12/5/2012

Reference Information

CVE: CVE-2012-5688

BID: 56817

MDVSA: 2012:177