Vulnerability & Exploit Database

Back to search

RHSA-2014:1244: bind97 security and bug fix update

Severity CVSS Published Added Modified
3 (AV:N/AC:H/Au:N/C:N/I:N/A:P) January 13, 2014 September 19, 2014 July 04, 2017


The Berkeley Internet Name Domain (BIND) is an implementation of the DomainName System (DNS) protocols. It contains a DNS server (named), a resolverlibrary with routines for applications to use when interfacing with DNS,and tools for verifying that the DNS server is operating correctly.These packages contain version 9.7 of the BIND suite.A denial of service flaw was found in the way BIND handled queries forNSEC3-signed zones. A remote attacker could use this flaw against anauthoritative name server that served NCES3-signed zones by sending aspecially crafted query, which, when processed, would cause named to crash.(CVE-2014-0591)Note: The CVE-2014-0591 issue does not directly affect the version ofbind97 shipped in Red Hat Enterprise Linux 5. This issue is being addressedhowever to assure it is not introduced in future builds of bind97 (possiblybuilt with a different compiler or C library optimization).This update also fixes the following bug:All bind97 users are advised to upgrade to these updated packages, whichcontain backported patches to correct these issues. After installing theupdate, the BIND daemon (named) will be restarted automatically.

Scan For This Vulnerability

Use our top-rated tool to discover, prioritize, and remediate your vulnerabilities

 Free InsightVM Trial




Related Vulnerabilities