CVE-2011-4313 improper assert
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
bind9 (Ubuntu) |
Fix Released
|
Medium
|
Marc Deslauriers |
Bug Description
http://
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- -------
Debian Security Advisory DSA-2347-1 security () debian org
http://
November 16, 2011 http://
- -------
Package : bind9
Vulnerability : improper assert
Problem type : remote
Debian-specific: no
CVE ID : CVE-2011-4313
It was discovered that BIND, a DNS server, crashes while processing
certain sequences of recursive DNS queries, leading to a denial of
service. Authoritative-only server configurations are not affected by
this issue.
For the oldstable distribution (lenny), this problem has been fixed in
version 1:9.6.ESV.
For the stable distribution (squeeze), this problem has been fixed in
version 1:9.7.3.
We recommend that you upgrade your bind9 packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://
Mailing list: debian-
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
iQEcBAEBAgAGBQJ
eu0CW1t8SsJBJiM
rcau04KWW+
SORCl3y1E7xLcXn
zmgLkQQ/
3jXkTjikHfpsDhl
=MMeY
-----END PGP SIGNATURE-----
_______
Full-Disclosure - We believe in it.
Charter: http://
Hosted and sponsored by Secunia - http://
http:// www.isc. org/software/ bind/advisories /cve-2011- 2464