A denial of service flaw was found in the way BIND processed certain control channel input. A remote attacker able to send a malformed packet to the control channel could use this flaw to cause named to crash.
Find out more about CVE-2016-1285 from the MITRE CVE dictionary dictionary and NIST NVD.
Base Score | 5 |
---|---|
Base Metrics | AV:N/AC:L/Au:N/C:N/I:N/A:P |
Access Vector | Network |
Access Complexity | Low |
Authentication | None |
Confidentiality Impact | None |
Integrity Impact | None |
Availability Impact | Partial |
Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).
Platform | Errata | Release Date |
---|---|---|
Red Hat Enterprise Linux Advanced Update Support 6.5 (bind) | RHSA-2016:0562 | 2016-03-31 |
Red Hat Enterprise Linux 6 (bind) | RHSA-2016:0459 | 2016-03-16 |
Red Hat Enterprise Linux Extended Update Support 6.6 (bind) | RHSA-2016:0562 | 2016-03-31 |
Red Hat Enterprise Linux 7 (bind) | RHSA-2016:0459 | 2016-03-16 |
Red Hat Enterprise Linux Advanced Update Support 6.4 (bind) | RHSA-2016:0562 | 2016-03-31 |
Red Hat Enterprise Linux 5 (bind) | RHSA-2016:0459 | 2016-03-16 |
Red Hat Enterprise Linux 5 (bind97) | RHSA-2016:0458 | 2016-03-16 |
Red Hat Enterprise Linux Advanced Update Support 6.2 (bind) | RHSA-2016:0601 | 2016-04-06 |
Platform | Package | State |
---|---|---|
Red Hat Enterprise Linux 4 | bind | Will not fix |
Restrict access to the control channel (by using the "controls" configuration statement in named.conf) to allow connection only from trusted systems.
Note that if no "controls" statement is present, named defaults to allowing control channel connections only from localhost (127.0.0.1 and ::1) if and only if the file rndc.key exists in the configuration directory and contains valid key syntax. If rndc.key is not present and no "controls" statement is present in named.conf, named will not accept commands on the control channel.