Isc bind Remote Denial of Service Vulnerability (CVE-2014-3859)
Isc bind Remote Denial of Service Vulnerability (CVE-2014-3859)
Release date:
Updated on:
Affected Systems:
Isc bind 9.10.0-p1
Isc bind 9.10.0
Description:
--------------------------------------------------------------------------------
Bugtraq id: 68038
CVE (CAN) ID: CVE-2014-3859
BIND is a widely used DNS protocol.
The isc bind 9.10.0 and 9.10.0-P1 versions have security vulnerabilities, which can be exploited by attackers to launch DoS attacks. This security vulnerability is caused by an error in processing EDNS options by libdns, which can be exploited to cause REQUIRE assertions to fail.
Use BIND to configure the DNS server
BIND + DLZ + MySQL smart DNS implementation of forward and reverse resolution
Domain Name Service BIND construction and application configuration
Ubuntu BIND9 wildcard domain name resolution Configuration
Install BIND9.6 in CentOS 5.2
<* Source: Codenomicon
Link: http://secunia.com/advisories/58946/
*>
Suggestion:
--------------------------------------------------------------------------------
Vendor patch:
ISC
---
The vendor has released a patch to fix this security problem. Please download it from the vendor's homepage:
Http://www.isc.org/downloads
Https://kb.isc.org/article/AA-01166/0/CVE-2014-3859%3A-BIND-named-can-crash-due-to-a-defect-in-EDNS-printing-processing.html
This article permanently updates the link address: