SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   BIND Vendors:   ISC (Internet Software Consortium)
(Oracle Issues Fix for Oracle Linux) ISC BIND Overflow in Processing Address Prefix List Data Lets Remote Authenticated Users Cause the Target Service to Crash
SecurityTracker Alert ID:  1034837
SecurityTracker URL:  http://securitytracker.com/id/1034837
CVE Reference:   CVE-2015-8704   (Links to External Site)
Date:  Jan 28 2016
Impact:   Denial of service via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 9.3.0 - 9.8.8, 9.9.0 - 9.9.8-P2, 9.9.3-S1 - 9.9.8-S3, 9.10.0 - 9.10.3-P2
Description:   A vulnerability was reported in ISC BIND. A remote authenticated user can cause the target service to crash.

A remote authenticated user can send specially crafted Address Prefix List (APL) data to trigger a buffer overflow and cause the target named service to crash.

The vulnerability resides in 'apl_42.c'.

Impact:   A remote authenticated user can cause the target 'named' service to crash.
Solution:   Oracle has issued a fix for bind97.

The Oracle Linux advisory is available at:

http://linux.oracle.com/errata/ELSA-2016-0074.html

Vendor URL:  linux.oracle.com/errata/ELSA-2016-0074.html (Links to External Site)
Cause:   Boundary error
Underlying OS:  Linux (Oracle)
Underlying OS Comments:  5

Message History:   This archive entry is a follow-up to the message listed below.
Jan 20 2016 ISC BIND Overflow in Processing Address Prefix List Data Lets Remote Authenticated Users Cause the Target Service to Crash



 Source Message Contents

Subject:  [El-errata] ELSA-2016-0074 Moderate: Oracle Linux 5 bind97 security update

Oracle Linux Security Advisory ELSA-2016-0074

http://linux.oracle.com/errata/ELSA-2016-0074.html

The following updated rpms for Oracle Linux 5 have been uploaded to the 
Unbreakable Linux Network:

i386:
bind97-9.7.0-21.P2.el5_11.5.i386.rpm
bind97-chroot-9.7.0-21.P2.el5_11.5.i386.rpm
bind97-devel-9.7.0-21.P2.el5_11.5.i386.rpm
bind97-libs-9.7.0-21.P2.el5_11.5.i386.rpm
bind97-utils-9.7.0-21.P2.el5_11.5.i386.rpm

x86_64:
bind97-9.7.0-21.P2.el5_11.5.x86_64.rpm
bind97-chroot-9.7.0-21.P2.el5_11.5.x86_64.rpm
bind97-devel-9.7.0-21.P2.el5_11.5.i386.rpm
bind97-devel-9.7.0-21.P2.el5_11.5.x86_64.rpm
bind97-libs-9.7.0-21.P2.el5_11.5.i386.rpm
bind97-libs-9.7.0-21.P2.el5_11.5.x86_64.rpm
bind97-utils-9.7.0-21.P2.el5_11.5.x86_64.rpm

ia64:
bind97-9.7.0-21.P2.el5_11.5.ia64.rpm
bind97-chroot-9.7.0-21.P2.el5_11.5.ia64.rpm
bind97-devel-9.7.0-21.P2.el5_11.5.ia64.rpm
bind97-libs-9.7.0-21.P2.el5_11.5.ia64.rpm
bind97-utils-9.7.0-21.P2.el5_11.5.ia64.rpm


SRPMS:
http://oss.oracle.com/ol5/SRPMS-updates/bind97-9.7.0-21.P2.el5_11.5.src.rpm



Description of changes:

[32:9.7.0-21.P2.5]
- Fix CVE-2015-8704



_______________________________________________
El-errata mailing list
El-errata@oss.oracle.com
https://oss.oracle.com/mailman/listinfo/el-errata
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC