what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Debian Security Advisory 3758-1

Debian Security Advisory 3758-1
Posted Jan 13, 2017
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3758-1 - Several denial-of-service vulnerabilities (assertion failures) were discovered in BIND, a DNS server implementation.

tags | advisory, vulnerability
systems | linux, debian
advisories | CVE-2016-9131, CVE-2016-9147, CVE-2016-9444
SHA-256 | 3829c8365faeb2e9468ba3e528a71716e2884ebd1d5192cbc1b518876007a5ee

Debian Security Advisory 3758-1

Change Mirror Download

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3758-1 security@debian.org
https://www.debian.org/security/ Florian Weimer
January 11, 2017 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : bind9
CVE ID : CVE-2016-9131 CVE-2016-9147 CVE-2016-9444
Debian Bug : 851062 851063 851065

Several denial-of-service vulnerabilities (assertion failures) were
discovered in BIND, a DNS server implementation.

CVE-2016-9131

A crafted upstream response to an ANY query could cause an
assertion failure.

CVE-2016-9147

A crafted upstream response with self-contradicting DNSSEC data
could cause an assertion failure.

CVE-2016-9444

Specially-crafted upstream responses with a DS record could cause
an assertion failure.

These vulnerabilities predominantly affect DNS servers providing
recursive service. Client queries to authoritative-only servers
cannot trigger these assertion failures. These vulnerabilities are
present whether or not DNSSEC validation is enabled in the server
configuration.

For the stable distribution (jessie), these problems have been fixed in
version 1:9.9.5.dfsg-9+deb8u9.

We recommend that you upgrade your bind9 packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)

iQEcBAEBAgAGBQJYdrZWAAoJEL97/wQC1SS+q2EH/AxKy35o0kVv6fryoFSaxfFt
U9hgp1t//5eDmt7H1oPGafeho1a9QVWZR9Hj0HogNK2UZKR3HyRCKwyGtSuEIrkV
Gq2byCUpYF38veRsvjld8nAMOXmtdH75qwTpfsq2tMPplmVP9zBozfRg3RzrmOvP
sJ3FUtl75PNGfKdD53Pptts5lHZ8lxah4iSpw7/J8rUNwrHSIzK7tOhaCm2Rbifq
MeXF49tG+4Ap8EfQEHD+LEejlKX925wDzpF5r/y+GJw2v3Ua1xSg0jIDyKWSPc7V
4+KyFEGNKCPEWrc4HfWduRjM7ZcAS/DWwIsRs05kPCN/qVmcmRI4thzL4Ub5VGE=
=tTsf
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close