A flaw was found in the way BIND performed DNSSEC validation. An attacker able to make BIND (functioning as a DNS resolver with DNSSEC validation enabled) resolve a name in an attacker-controlled domain could cause named to exit unexpectedly with an assertion failure.
Find out more about CVE-2015-4620 from the MITRE CVE dictionary dictionary and NIST NVD.
This issue did not affect the versions of bind packages as shipped with Red Hat Enterprise Linux 4 and 5. This issue affects the versions of bind97 packages as shipped with Red Hat Enterprise Linux 5.
Red Hat Enterprise Linux 5 is now in Production 3 Phase of the support and maintenance life cycle. This has been rated as having Important security impact and is not currently planned to be addressed in future bind97 packages updates in Red Hat Enterprise Linux 5. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.
Base Score | 5 |
---|---|
Base Metrics | AV:N/AC:L/Au:N/C:N/I:N/A:P |
Access Vector | Network |
Access Complexity | Low |
Authentication | None |
Confidentiality Impact | None |
Integrity Impact | None |
Availability Impact | Partial |
Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).
Platform | Errata | Release Date |
---|---|---|
Red Hat Enterprise Linux 6 (bind) | RHSA-2015:1471 | 2015-07-22 |
Red Hat Enterprise Linux 7 (bind) | RHSA-2015:1443 | 2015-07-20 |
Platform | Package | State |
---|---|---|
Red Hat Enterprise Linux 5 | bind97 | Will not fix |
Red Hat Enterprise Linux 5 | bind | Not affected |
Red Hat Enterprise Linux 4 | bind | Not affected |