------------------------------------------------------------
Arch Linux Security Warning ALSW 2007-#30
------------------------------------------------------------

Name: bind
Date: 2007-05-10
Severity: Medium
Warning #: 2007-#30

------------------------------------------------------------

Product Background
===================
BIND (Berkeley Internet Name Domain) is an implementation of the Domain
Name System (DNS) protocols and provides an openly redistributable
reference implementation of the major components of the Domain Name System,

Problem Background - Impact
===================
A vulnerability in ISC BIND 9.4.0, when recursion is enabled, could
allow a remote attacker to cause a denial of service (daemon exit)
via a certain sequence of queries.


Problem Packages
===================
Package: bind
Repo: current
Group: daemons
Unsafe: < 9.4.1
Safe: >= 9.4.1

Package Fix
===================
Upgrade to 9.4.1

===================

Unofficial ArchLinux Security Bug Tracker:
http://jjdanimoth.netsons.org/alsw.html

Reference(s)
===================
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2241

Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
arch mailing list
[email protected]
http://archlinux.org/mailman/listinfo/arch

Reply via email to