You are here
Home > Preporuke > Sigurnosni nedostatak programskog paketa bind9

Sigurnosni nedostatak programskog paketa bind9

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LUB

==========================================================================
Ubuntu Security Notice USN-3535-1
January 17, 2018

bind9 vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 17.10
– Ubuntu 16.04 LTS
– Ubuntu 14.04 LTS

Summary:

Bind could be made to crash if it received specially crafted network
traffic.

Software Description:
– bind9: Internet Domain Name Server

Details:

Jayachandran Palanisamy discovered that the Bind resolver incorrectly
handled fetch cleanup sequencing. A remote attacker could possibly use this
issue to cause Bind to crash, resulting in a denial of service.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 17.10:
bind9 1:9.10.3.dfsg.P4-12.6ubuntu1.1

Ubuntu 16.04 LTS:
bind9 1:9.10.3.dfsg.P4-8ubuntu1.10

Ubuntu 14.04 LTS:
bind9 1:9.9.5.dfsg-3ubuntu0.17

In general, a standard system update will make all the necessary changes.

References:
https://www.ubuntu.com/usn/usn-3535-1
CVE-2017-3145

Package Information:
https://launchpad.net/ubuntu/+source/bind9/1:9.10.3.dfsg.P4-12.6ubuntu1.1
https://launchpad.net/ubuntu/+source/bind9/1:9.10.3.dfsg.P4-8ubuntu1.10
https://launchpad.net/ubuntu/+source/bind9/1:9.9.5.dfsg-3ubuntu0.17

—–BEGIN PGP SIGNATURE—–
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=NudV
—–END PGP SIGNATURE—–

AutorDanijel Kozinovic
Cert idNCERT-REF-2018-01-0120-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
Izvorhttp://www.adobe.com/
Top
More in Preporuke
Sigurnosni nedostatak jezgre operacijskog sustava

Otkriven je sigurnosni nedostatak u radu jezgre operacijskog sustava RHEL. Otkriveni nedostatak potencijalnim napadačima omogućuje otkrivanje osjetljivih informacija. Savjetuje se...

Close