SB2017041821 - Fedora 24 update for bind99
Published: April 18, 2017 Updated: April 24, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 3 secuirty vulnerabilities.
1) Assertion failure (CVE-ID: CVE-2017-3136)
The vulnerability allows a remote authenticated attacker to perform a denial of service (DoS) attack.The vulnerability exists due to the servers are configured to use DNS64 and if the option "break-dnssec yes;" is in use. A remote attacker can supply specially crafted queries, if it was configured to use the DNS64 feature and other preconditions were met, trigger a server using DNS64 assertion failure and cause the service to crash.
2) Assertion failure (CVE-ID: CVE-2017-3137)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.The vulnerability exists due to improper input validation when processing query response containing CNAME or DNAME resource records in an unusual order in BIND. A remote attacker can trigger assertion failure and crash BIND application.
3) Assertion failure (CVE-ID: CVE-2017-3138)
The vulnerability allows a remote authenticated attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to named contains a feature which allows operators to issue commands to a running server by communicating with the server process over a control channel, using a utility program such as rndc.. A remote attacker can send some versions of named a null command string, trigger a REQUIRE assertion failure and cause the service to crash.
Remediation
Install update from vendor's website.