FYI...
CVE-2015-5986: An incorrect boundary check can trigger a REQUIRE assertion failure in openpgpkey_61.c
- https://kb.isc.org/article/AA-01291/0
Last Updated: 2015-09-02
CVE: CVE-2015-5986
Document Version: 2.0
Program Impacted: BIND
Versions affected: 9.9.7 -> 9.9.7-P2, 9.10.2 -> 9.10.2-P3.
Severity: Critical
Exploitable: Remotely
Description: An incorrect boundary check in openpgpkey_61.c can cause named to terminate due to a REQUIRE assertion failure. This defect can be deliberately exploited by an attacker who can provide a maliciously constructed response in answer to a query.
Impact: A server which encounters this error will terminate due to a REQUIRE assertion failure, resulting in denial of service to clients. Recursive servers are at greatest risk from this defect but some circumstances may exist in which the attack can be successfully exploited against an authoritative server. Servers should be upgraded to a fixed version.
Workarounds: No workarounds are known to exist.
Active exploits: None known.
Solution: Upgrade to the patched release most closely related to your current version of BIND. These can all be downloaded from http://www.isc.org/downloads.
BIND 9 version 9.9.7-P3
BIND 9 version 9.10.2-P4 ...
CVE-2015-5722: Parsing malformed keys may cause BIND to exit due to a failed assertion in buffer.c
- https://kb.isc.org/article/AA-01287/0
Last Updated: 2015-09-02
CVE: CVE-2015-5722
Document Version: 2.0
Program Impacted: BIND
Versions affected: BIND 9.0.0 -> 9.8.8, BIND 9.9.0 -> 9.9.7-P2, BIND 9.10.0 -> 9.10.2-P3
Severity: Critical
Exploitable: Remotely
Description: Parsing a malformed DNSSEC key can cause a validating resolver to exit due to a failed assertion in buffer.c. It is possible for a remote attacker to deliberately trigger this condition, for example by using a query which requires a response from a zone containing a deliberately malformed key.
Impact: Recursive servers are at greatest risk but an authoritative server could be affected if an attacker controls a zone the server must query against to perform its zone service. Servers which are affected may terminate with an assertion failure, causing denial of service to all clients.
Workarounds: Servers which are not performing validation are not at risk from this defect (but are at increased risk from other types of DNS attack.) ISC does not recommend disabling validation to deal with this issue; upgrading to a fixed version is the preferred solution.
Active exploits: None known
Solution: Upgrade to the patched release most closely related to your current version of BIND. These can all be downloaded from http://www.isc.org/downloads.
BIND 9 version 9.9.7-P3
BIND 9 version 9.10.2-P4 ...
___
- http://www.securityt....com/id/1033452
CVE Reference: CVE-2015-5722
Sep 2 2015
Impact: Denial of service via network
Fix Available: Yes Vendor Confirmed: Yes
Version(s): 9.0.0 - 9.8.8, 9.9.0 - 9.9.7-P2, 9.10.0 - 9.10.2-P3
Description: A vulnerability was reported in BIND. A remote user can cause the target service to crash.
Solution: The vendor has issued a fix (9.9.7-P3, 9.10.2-P4, 9.9.8rc1, 9.10.3rc1)...
- http://www.securityt....com/id/1033453
CVE Reference: CVE-2015-5986
Sep 2 2015
Impact: Denial of service via network
Fix Available: Yes Vendor Confirmed: Yes
Version(s): 9.9.7 - 9.9.7-P2, 9.10.2 - 9.10.2-P3
Description: A vulnerability was reported in BIND. A remote user can cause the target service to crash.
Solution: The vendor has issued a fix (9.9.7-P3, 9.10.2-P4, 9.9.8rc1, 9.10.3rc1)...
Edited by AplusWebMaster, 03 September 2015 - 06:33 AM.