BIND: Multiple vulnerabilities
Gentoo Linux Security Advisory
||GLSA 201209-04 / bind
||September 24, 2012
||September 24, 2012: 1
All supported architectures
#402661, #419637, #427966, #434876
Multiple vulnerabilities have been found in BIND, the worst of
which may allow remote Denial of Service.
BIND is the Berkeley Internet Name Domain Server.
Multiple vulnerabilities have been discovered in BIND:
- Domain names are not properly revoked due to an error in the cache
update policy (CVE-2012-1033).
- BIND accepts records with zero-length RDATA fields (CVE-2012-1667).
- An assertion failure from the failing-query cache could occur when
DNSSEC validation is enabled (CVE-2012-3817).
- A memory leak may occur under high TCP query loads (CVE-2012-3868).
- An assertion error can occur when a query is performed for a record
with RDATA greater than 65535 bytes (CVE-2012-4244).
A remote attacker may be able to cause a Denial of Service condition or
keep domain names resolvable after it has been deleted from registration.
There is no known workaround at this time.
All BIND users should upgrade to the latest version:
Code Listing 3.1: Resolution
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-dns/bind-9.9.1_p3"