openSUSE Security Update : bind (openSUSE-SU-2012:1649-1)

high Nessus Plugin ID 74845

Synopsis

The remote openSUSE host is missing a security update.

Description

bind received updates to fix bugs and security issues.

On openSUSE 12.2, bind was updated to 9.9.2-P1. On openSUSE 12.1, bind was updated to 9.8.4-P1.

Main security fix: CVE-2012-5688: Prevents named from aborting with a require assertion failure on servers with DNS64 enabled. These crashes might occur as a result of specific queries that are received. (Note that this fix is a subset of a series of updates that will be included in full in BIND 9.8.5 and 9.9.3 as change #3388, RT #30996).
[CVE-2012-5688] [RT #30792]

Solution

Update the affected bind packages.

See Also

https://bugzilla.novell.com/show_bug.cgi?id=792926

https://lists.opensuse.org/opensuse-updates/2012-12/msg00030.html

Plugin Details

Severity: High

ID: 74845

File Name: openSUSE-2012-853.nasl

Version: 1.4

Type: local

Agent: unix

Published: 6/13/2014

Updated: 1/19/2021

Supported Sensors: Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: High

Base Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:bind-utils, p-cpe:/a:novell:opensuse:bind-libs-32bit, p-cpe:/a:novell:opensuse:bind-libs, p-cpe:/a:novell:opensuse:bind-libs-debuginfo, p-cpe:/a:novell:opensuse:bind, p-cpe:/a:novell:opensuse:bind-devel, p-cpe:/a:novell:opensuse:bind-utils-debuginfo, p-cpe:/a:novell:opensuse:bind-debuginfo, p-cpe:/a:novell:opensuse:bind-libs-debuginfo-32bit, p-cpe:/a:novell:opensuse:bind-lwresd-debuginfo, cpe:/o:novell:opensuse:12.2, p-cpe:/a:novell:opensuse:bind-lwresd, cpe:/o:novell:opensuse:12.1, p-cpe:/a:novell:opensuse:bind-chrootenv, p-cpe:/a:novell:opensuse:bind-debugsource

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Patch Publication Date: 12/7/2012

Reference Information

CVE: CVE-2012-5688