Slackware Linux update for bind



| Updated: 2023-05-07
Risk High
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2009-0696
CWE-ID CWE-617
Exploitation vector Network
Public exploit This vulnerability is being exploited in the wild.
Vulnerable software

Other

Vendor

Security Bulletin

This security bulletin contains one high risk vulnerability.

1) Assertion failure

EUVDB-ID: #VU6168

Risk: High

CVSSv4.0: 8.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:A/U:Amber]

CVE-ID: CVE-2009-0696

CWE-ID: CWE-617 - Reachable Assertion

Exploit availability: Yes

Description

The vulnerability allows a remote attacker to perform denial of service attack.

The vulnerability exists due to assertion failure in dns_db_findrdataset() function within db.c when named is configured as a master server. A remote unauthenticated attacker can send an ANY record in the prerequisite section of a crafted dynamic update message and trigger assertion failure and daemon exit.

Successful exploitation of this vulnerability may allow an attacker to perform denial of service (DoS) attack.

Note: this vulnerability is being actively exploited.

Mitigation

Update the affected package bind.

Vulnerable software versions

:

CPE2.3 External links

https://www.slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.561499


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

Yes. This vulnerability is being exploited in the wild.



###SIDEBAR###