-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Package : bind9 Version : 1:9.7.3.dfsg-1~squeeze16 CVE ID : CVE-2015-5477
Jonathan Foote discovered that the BIND DNS server does not properly handle TKEY queries. A remote attacker can take advantage of this flaw to mount a denial of service via a specially crafted query triggering an assertion failure and causing BIND to exit. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBCgAGBQJVt9OfAAoJEAVMuPMTQ89EuDoP/0L6vOkotJpl5PnUR4TZKSdr uN/sHzdrrCTzFfu5+ouS0sGANTUexKbJi98vM4EcCcjjDb3fnWGh7Rfzmv3sEO5t LIvT94K5IW+wfxlOIF1k5ksFc/ywFNDfMkskMqxQlPE9Y/mCMzTG6fJRm3zNaAB0 a3IdvOsT2QWu5z3qBw3oq4FURbwXj7cWZkpXiFidIAifSird3zU5pbkp/CzI9Gfu cW9fY4e8tlvHKR+ChuP1jrwPLp1M1ckUfz/WlRd+tRh4IwXuindhGpM3aWd5Jhm5 DXQUvokX13l4OJ4Icja9Tyh1UGQ45Uex3emX+pwiNuOg9Y1TXgeAObVjzqc4zxki TRQY3umCSW2oc21cqM9jIebHnINZ0lI2myN43zA0kMDQqA+b40xSFYbiOpGLETzY CQ2iWq+P5CGOJ1LgHpD1svAYl+fXOOyVnfPceZTu3Xm+LlWARBgoxnMR3CC0jpIC t2nMnvlLj9kLOn/ZQ4yZpAIvGy4UJhoHuY6lmXuiC+qIW4OT8Tm0z8tIlEIpMZ8F /Z8kjcFiMwiqYIf7fktzHqEcBf4YjhRdVTXpWLzPknJO7Ys8q6oOjxVpybnDzR6x ywZncXhojE09f55k17fXEC7y/OCXnj+xlsVa1CWVUmizj7S8mZu+GJGjhn26f1ln E8ijxYzNLmDib56U8gCj =uQbE -----END PGP SIGNATURE----- -- To UNSUBSCRIBE, email to [email protected] with a subject of "unsubscribe". Trouble? Contact [email protected] Archive: https://lists.debian.org/[email protected]
