Plugins Database As of 12-10-2019

RedHat Update for bind RHSA-2018:0102-01

Red Hat Local Security Checks
Impact by CVSS Score
  • ID: 1.3.6.1.4.1.25623.1.0.910003

CVSS Base Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:P

Detection Type:
Linux Distribution Package

Summary:
The remote host is missing an update for the 'bind' Linux Distribution Package(s) announced via the referenced advisory.

Detection Method:
Checks if a vulnerable version is present on the target host.

Technical Details:
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named) a resolver library (routines for applications to use when interfacing with DNS) and tools for verifying that the DNS server is operating correctly. Security Fix(es): * A use-after-free flaw leading to denial of service was found in the way BIND internally handled cleanup operations on upstream recursion fetch contexts. A remote attacker could potentially use this flaw to make named, acting as a DNSSEC validating resolver, exit unexpectedly with an assertion failure via a specially crafted DNS request. (CVE-2017-3145) Red Hat would like to thank ISC for reporting this issue. Upstream acknowledges Jayachandran Palanisamy (Cygate AB) as the original reporter.

Affected Versions:
bind on Red Hat Enterprise Linux Server (v. 7)

Recommendations:
Please Install the Updated Packages.

Solution Type:
Vendor Patch

Search
Severity
Medium
CVSS Score
5.0
Published
2018-01-23 06:37:12
Modified
2019-02-14 07:51:59
CVE
CVE-2017-3145

You never have to pay for a vulnerability scanning and management software again.

Tired of paying a subscription 'per asset' or 'per IP'? Well you can officially cancel your current subscription. Mageni provides a free, open source and enterprise-ready vulnerability scanning and management platform which helps you to find, prioritize, remediate and manage your vulnerabilities. It is free and always will be.