what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Debian Security Advisory 3420-1

Debian Security Advisory 3420-1
Posted Dec 16, 2015
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3420-1 - It was discovered that the BIND DNS server does not properly handle the parsing of incoming responses, allowing some records with an incorrect class to be accepted by BIND instead of being rejected as malformed. This can trigger a REQUIRE assertion failure when those records are subsequently cached. A remote attacker can exploit this flaw to cause a denial of service against servers performing recursive queries.

tags | advisory, remote, denial of service
systems | linux, debian
advisories | CVE-2015-8000
SHA-256 | d95fc93697042d34212e4968f3aecb3897ebd34cc4fccbca08169849034f6cea

Debian Security Advisory 3420-1

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3420-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
December 15, 2015 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : bind9
CVE ID : CVE-2015-8000
Debian Bug : 808081

It was discovered that the BIND DNS server does not properly handle the
parsing of incoming responses, allowing some records with an incorrect
class to be accepted by BIND instead of being rejected as malformed.
This can trigger a REQUIRE assertion failure when those records are
subsequently cached. A remote attacker can exploit this flaw to cause a
denial of service against servers performing recursive queries.

For the oldstable distribution (wheezy), this problem has been fixed
in version 1:9.8.4.dfsg.P1-6+nmu2+deb7u8.

For the stable distribution (jessie), this problem has been fixed in
version 1:9.9.5.dfsg-9+deb8u4.

We recommend that you upgrade your bind9 packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=gbu+
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    17 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close