BIND: Multiple vulnerabilities — GLSA 201708-01

Multiple vulnerabilities have been found in BIND, the worst of which allows remote attackers to cause a Denial of Service condition.

Affected packages

net-dns/bind on all architectures
Affected versions < 9.11.1_p1
Unaffected versions >= 9.11.1_p1

Background

BIND (Berkeley Internet Name Domain) is a Name Server.

Description

Multiple vulnerabilities have been discovered in BIND. Please review the CVE identifiers referenced below for details.

Impact

A remote attacker could send a specially crafted DNS request to the BIND resolver resulting in a Denial of Service condition.

Workaround

There is no known workaround at this time.

Resolution

All BIND users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=net-dns/bind-9.11.1_p1"
 

References

Release date
August 17, 2017

Latest revision
August 17, 2017: 1

Severity
normal

Exploitable
remote

Bugzilla entries