Reachable Assertion Affecting bind-utils package, versions <32:9.8.2-0.37.rc1.el6_7.7


high

Snyk CVSS

    Attack Complexity Low

    Threat Intelligence

    EPSS 10.51% (95th percentile)
Expand this section
NVD
6.8 medium
Expand this section
Red Hat
5.3 medium

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-CENTOS6-BINDUTILS-2129050
  • published 26 Jul 2021
  • disclosed 9 Mar 2016

How to fix?

Upgrade Centos:6 bind-utils to version 32:9.8.2-0.37.rc1.el6_7.7 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream bind-utils package and not the bind-utils package as distributed by Centos. See How to fix? for Centos:6 relevant fixed versions and status.

named in ISC BIND 9.x before 9.9.8-P4 and 9.10.x before 9.10.3-P4 does not properly handle DNAME records when parsing fetch reply messages, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a malformed packet to the rndc (aka control channel) interface, related to alist.c and sexpr.c.

References