CVE-2011-4313 Affecting bind-libs package, versions <32:9.7.3-2.el6_1.P3.3
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-CENTOS6-BINDLIBS-2051187
- published 26 Jul 2021
- disclosed 16 Nov 2011
Introduced: 16 Nov 2011
CVE-2011-4313 Open this link in a new tabHow to fix?
Upgrade Centos:6
bind-libs
to version 32:9.7.3-2.el6_1.P3.3 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream bind-libs
package and not the bind-libs
package as distributed by Centos
.
See How to fix?
for Centos:6
relevant fixed versions and status.
query.c in ISC BIND 9.0.x through 9.6.x, 9.4-ESV through 9.4-ESV-R5, 9.6-ESV through 9.6-ESV-R5, 9.7.0 through 9.7.4, 9.8.0 through 9.8.1, and 9.9.0a1 through 9.9.0b1 allows remote attackers to cause a denial of service (assertion failure and named exit) via unknown vectors related to recursive DNS queries, error logging, and the caching of an invalid record by the resolver.
References
- http://www-01.ibm.com/support/docview.wss?uid=isg1IV11106
- http://www.ibm.com/support/docview.wss?uid=isg1IV11248
- http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html
- http://www.securityfocus.com/bid/50690
- http://www.kb.cert.org/vuls/id/606539
- http://blogs.oracle.com/sunsecurity/entry/cve_2011_4313_denial_of
- http://support.apple.com/kb/HT5501
- http://www.isc.org/software/bind/advisories/cve-2011-4313
- https://access.redhat.com/security/cve/CVE-2011-4313
- http://www.debian.org/security/2011/dsa-2347
- http://lists.fedoraproject.org/pipermail/package-announce/2011-November/069463.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-November/069970.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-November/069975.html
- http://security.freebsd.org/advisories/FreeBSD-SA-11:06.bind.asc
- http://marc.info/?l=bugtraq&m=132310123002302&w=2
- http://marc.info/?l=bugtraq&m=133978480208466&w=2
- http://marc.info/?l=bugtraq&m=141879471518471&w=2
- http://www.mandriva.com/security/advisories?name=MDVSA-2011:176
- http://osvdb.org/77159
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14343
- http://www.redhat.com/support/errata/RHSA-2011-1458.html
- http://www.redhat.com/support/errata/RHSA-2011-1459.html
- http://www.redhat.com/support/errata/RHSA-2011-1496.html
- https://access.redhat.com/errata/RHSA-2011:1458
- http://www.securitytracker.com/id?1026335
- http://secunia.com/advisories/46536
- http://secunia.com/advisories/46829
- http://secunia.com/advisories/46887
- http://secunia.com/advisories/46890
- http://secunia.com/advisories/46905
- http://secunia.com/advisories/46906
- http://secunia.com/advisories/46943
- http://secunia.com/advisories/46984
- http://secunia.com/advisories/47043
- http://secunia.com/advisories/47075
- http://secunia.com/advisories/48308
- http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00027.html
- http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00028.html
- http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00029.html
- http://www.ubuntu.com/usn/USN-1264-1
- https://exchange.xforce.ibmcloud.com/vulnerabilities/71332