CVE-2016-1285
Find out more about CVE-2016-1285 from the MITRE CVE dictionary dictionary and NIST NVD.
CVSS v2 metrics
| Base Score | 5 |
|---|---|
| Base Metrics | AV:N/AC:L/Au:N/C:N/I:N/A:P |
| Access Vector | Network |
| Access Complexity | Low |
| Authentication | None |
| Confidentiality Impact | None |
| Integrity Impact | None |
| Availability Impact | Partial |
Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).
Red Hat Security Errata
| Platform | Errata | Release Date |
|---|---|---|
| Red Hat Enterprise Linux Advanced Update Support 6.5 (bind) | RHSA-2016:0562 | 2016-03-31 |
| Red Hat Enterprise Linux 6 (bind) | RHSA-2016:0459 | 2016-03-16 |
| Red Hat Enterprise Linux Extended Update Support 6.6 (bind) | RHSA-2016:0562 | 2016-03-31 |
| Red Hat Enterprise Linux 7 (bind) | RHSA-2016:0459 | 2016-03-16 |
| Red Hat Enterprise Linux Advanced Update Support 6.4 (bind) | RHSA-2016:0562 | 2016-03-31 |
| Red Hat Enterprise Linux 5 (bind) | RHSA-2016:0459 | 2016-03-16 |
| Red Hat Enterprise Linux 5 (bind97) | RHSA-2016:0458 | 2016-03-16 |
| Red Hat Enterprise Linux Advanced Update Support 6.2 (bind) | RHSA-2016:0601 | 2016-04-06 |
Affected Packages State
| Platform | Package | State |
|---|---|---|
| Red Hat Enterprise Linux 4 | bind | Will not fix |
Acknowledgements
Red Hat would like to thank ISC for reporting this issue.Mitigation
Restrict access to the control channel (by using the "controls" configuration statement in named.conf) to allow connection only from trusted systems.
Note that if no "controls" statement is present, named defaults to allowing control channel connections only from localhost (127.0.0.1 and ::1) if and only if the file rndc.key exists in the configuration directory and contains valid key syntax. If rndc.key is not present and no "controls" statement is present in named.conf, named will not accept commands on the control channel.
