Improper Input Validation Affecting bind-libs package, versions <32:9.8.2-0.10.rc1.el6_3.6
Threat Intelligence
EPSS
3.49% (92nd
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-CENTOS6-BINDLIBS-2067314
- published 26 Jul 2021
- disclosed 4 Dec 2012
How to fix?
Upgrade Centos:6
bind-libs
to version 32:9.8.2-0.10.rc1.el6_3.6 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream bind-libs
package and not the bind-libs
package as distributed by Centos
.
See How to fix?
for Centos:6
relevant fixed versions and status.
ISC BIND 9.8.x before 9.8.4-P1 and 9.9.x before 9.9.2-P1, when DNS64 is enabled, allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a crafted query.
References
- http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html
- https://kb.isc.org/article/AA-00828
- http://support.apple.com/kb/HT5880
- https://access.redhat.com/security/cve/CVE-2012-5688
- http://rhn.redhat.com/errata/RHSA-2012-1549.html
- https://access.redhat.com/errata/RHSA-2012:1549
- http://www.slackware.com/security/viewer.php?l=slackware-security&y=2012&m=slackware-security.536004
- http://www.ubuntu.com/usn/USN-1657-1
CVSS Scores
version 3.1