First published: Mon Oct 09 2023(Updated: )
It was discovered that Bind incorrectly handled certain control channel messages. A remote attacker with access to the control channel could possibly use this issue to cause Bind to crash, resulting in a denial of service.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/bind9 | <1:9.11.3+dfsg-1ubuntu1.19+esm2 | 1:9.11.3+dfsg-1ubuntu1.19+esm2 |
=18.04 | ||
All of | ||
ubuntu/libbind9-160 | <1:9.11.3+dfsg-1ubuntu1.19+esm2 | 1:9.11.3+dfsg-1ubuntu1.19+esm2 |
=18.04 | ||
All of | ||
ubuntu/bind9 | <1:9.10.3.dfsg.P4-8ubuntu1.19+esm7 | 1:9.10.3.dfsg.P4-8ubuntu1.19+esm7 |
=16.04 | ||
All of | ||
ubuntu/libbind9-140 | <1:9.10.3.dfsg.P4-8ubuntu1.19+esm7 | 1:9.10.3.dfsg.P4-8ubuntu1.19+esm7 |
=16.04 | ||
All of | ||
ubuntu/bind9 | <1:9.9.5.dfsg-3ubuntu0.19+esm11 | 1:9.9.5.dfsg-3ubuntu0.19+esm11 |
=14.04 | ||
All of | ||
ubuntu/libbind9-90 | <1:9.9.5.dfsg-3ubuntu0.19+esm11 | 1:9.9.5.dfsg-3ubuntu0.19+esm11 |
=14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is USN-6421-1.
The title of this vulnerability is USN-6421-1: Bind vulnerability.
The Bind vulnerability involves the incorrect handling of certain control channel messages, which allows a remote attacker with access to the control channel to crash Bind, resulting in a denial of service.
The affected software versions are: bind9 1:9.11.3+dfsg-1ubuntu1.19+esm2, libbind9-160 1:9.11.3+dfsg-1ubuntu1.19+esm2, bind9 1:9.10.3.dfsg.P4-8ubuntu1.19+esm7, libbind9-140 1:9.10.3.dfsg.P4-8ubuntu1.19+esm7, bind9 1:9.9.5.dfsg-3ubuntu0.19+esm11, and libbind9-90 1:9.9.5.dfsg-3ubuntu0.19+esm11.
To fix the Bind vulnerability, you should update the affected software versions to the recommended remedies provided by Ubuntu.