CVE-2015-5477

Related Vulnerabilities: CVE-2015-5477  

A flaw was found in the way BIND handled requests for TKEY DNS resource records. A remote attacker could use this flaw to make named (functioning as an authoritative DNS server or a DNS resolver) exit unexpectedly with an assertion failure via a specially crafted DNS request packet.

A flaw was found in the way BIND handled requests for TKEY DNS resource records. A remote attacker could use this flaw to make named (functioning as an authoritative DNS server or a DNS resolver) exit unexpectedly with an assertion failure via a specially crafted DNS request packet.

Find out more about CVE-2015-5477 from the MITRE CVE dictionary dictionary and NIST NVD.

CVSS v2 metrics

Base Score 5
Base Metrics AV:N/AC:L/Au:N/C:N/I:N/A:P
Access Vector Network
Access Complexity Low
Authentication None
Confidentiality Impact None
Integrity Impact None
Availability Impact Partial

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat Security Errata

Platform Errata Release Date
Red Hat Enterprise Linux 5 (bind) RHSA-2015:1514 2015-07-28
Red Hat Enterprise Linux 5 (bind97) RHSA-2015:1515 2015-07-28
Red Hat Enterprise Linux Advanced Update Support 6.5 (bind) RHSA-2016:0078 2016-01-28
Red Hat Enterprise Linux Advanced Update Support 6.4 (bind) RHSA-2016:0078 2016-01-28
Red Hat Enterprise Linux 7 (bind) RHSA-2015:1513 2015-07-29
Red Hat Enterprise Linux Extended Update Support 6.6 (bind) RHSA-2016:0079 2016-01-28
Red Hat Enterprise Linux 6 (bind) RHSA-2015:1513 2015-07-29

Affected Packages State

Platform Package State
Red Hat Enterprise Linux 4 bind Will not fix

Acknowledgements

Red Hat would like to thank ISC for reporting this issue. Upstream acknowledges Jonathan Foote as the original reporter.

External References