SB2016033111 - Red Hat Enterprise Linux 6 update for bind 



SB2016033111 - Red Hat Enterprise Linux 6 update for bind

Published: March 31, 2016 Updated: April 24, 2025

Security Bulletin ID SB2016033111
Severity
High
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Remote access
Highest impact Denial of service

Breakdown by Severity

High 50% Medium 50%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 secuirty vulnerabilities.


1) Input validation error (CVE-ID: CVE-2016-1285)

The vulnerability allows a remote non-authenticated attacker to a crash the entire system.

named in ISC BIND 9.x before 9.9.8-P4 and 9.10.x before 9.10.3-P4 does not properly handle DNAME records when parsing fetch reply messages, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a malformed packet to the rndc (aka control channel) interface, related to alist.c and sexpr.c.


2) Input validation error (CVE-ID: CVE-2016-1286)

The vulnerability allows a remote non-authenticated attacker to a crash the entire system.

named in ISC BIND 9.x before 9.9.8-P4 and 9.10.x before 9.10.3-P4 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a crafted signature record for a DNAME record, related to db.c and resolver.c.


Remediation

Install update from vendor's website.