BIND 9.9.8 Release
Date: 17 September 2015
The purpose of this advisory is to bring attention to the recently released security fixes for BIND.
Internet Systems Consortium (ISC) has released a new version of BIND that contains security fixes to address four vulnerabilities in BIND.
- An incorrect boundary check in the OPENPGPKEY rdatatype could trigger an assertion failure.
- A buffer accounting error could trigger an assertion failure when parsing certain malformed DNSSEC keys.
- A specially crafted query could trigger an assertion failure in message.c.
- On servers configured to perform DNSSEC validation, an assertion failure could be triggered on answers from a specially configured server.
Versions affected: prior to BIND 9.9.8
CVE References: CVE-2015-5722, CVE-2015-5986, CVE-2015-5477, CVE-2015-4620
CCIRC recommends that owner/operators test and deploy the vendor released updates or workarounds to affected platforms accordingly.
Note to Readers
In support of Public Safety's mission to build a safe and resilient Canada, CCIRC's mandate is to help ensure the security and resilience of the vital non-federal government cyber systems that underpin Canada's national security, public safety and economic prosperity. As Canada's computer security incident response team, CCIRC is Canada's national coordination centre for the prevention and mitigation of, preparedness for, response to, and recovery from cyber incidents on non-federal government systems. It does this by providing authoritative advice and support, and coordinating information sharing and incident response.
Please note, CCIRC PGP key has recently been updated.
For general information, please contact Public Safety Canada's Public Affairs division at:
Telephone: 613-944-4875 or 1-800-830-3118
- Date modified: