SB2018011801 - Slackware Linux update for bind



SB2018011801 - Slackware Linux update for bind

Published: January 18, 2018

Security Bulletin ID SB2018011801
Severity
Low
Patch available
YES
Number of vulnerabilities 1
Exploitation vector Remote access
Highest impact Denial of service

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) Use-after-free error (CVE-ID: CVE-2017-3145)

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists due to improper sequencing cleanup operations on upstream recursion fetch contexts. A remote attacker can trigger use-after-free error that may lead to assertion failure and cause the BIND name server (named) process to crash.

Successful exploitation of the vulnerability results in denial of service.

Remediation

Install update from vendor's website.