Please whitelist cPanel in your adblocker so that you’re able to see our version release promotions, thanks!

The Community Forums

Interact with an entire community of cPanel & WHM users!

BIND Security CVE2013-4854

Discussion in 'Security' started by batcrew3, Jul 29, 2013.

  1. batcrew3

    batcrew3 Registered

    Joined:
    Aug 17, 2010
    Messages:
    1
    Likes Received:
    0
    Trophy Points:
    51
    Anyone can help me how can we get and apply security patch for this?

     
  2. inthukha

    inthukha Well-Known Member

    Joined:
    Jul 17, 2013
    Messages:
    61
    Likes Received:
    0
    Trophy Points:
    6
    cPanel Access Level:
    Root Administrator
    Hi,

    From where you get this acknowledge regarding this ? as i didn't received any email from cPanel itself.
     
  3. mtindor

    mtindor Well-Known Member

    Joined:
    Sep 14, 2004
    Messages:
    1,343
    Likes Received:
    58
    Trophy Points:
    178
    Location:
    inside a catfish
    cPanel Access Level:
    Root Administrator
    The likely reason why you didn't receive an email from cPanel regarding this CVE is because this is not a cPanel specific issue. It's specific to any OS running one of the vulnerable versions of Bind. It's OS-related (RHEL, CentOS, Ubuntu, etc) rather than cPanel-related.

    You can get the information directly from the ISC website -- right from the horses' mouth, if you wish:

    https://kb.isc.org/article/AA-01015/0/CVE-2013-4854%3A-A-specially-crafted-query-can-cause-BIND-to-terminate-abnormally.html

    If you're running RHEL or CentOS as your OS, you might want to follow the bugzilla writeup on the current status of any update for RHEL. Once Redhat releases an update, it'll trickle down to CentOS users and thus be available as an update in CentOS.

    https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4854

    M
     
    Stop hovering to collapse... Click to collapse... Hover to expand... Click to expand...
  4. cPanelMichael

    cPanelMichael Forums Analyst
    Staff Member

    Joined:
    Apr 11, 2011
    Messages:
    44,377
    Likes Received:
    1,857
    Trophy Points:
    363
    cPanel Access Level:
    Root Administrator
    Hello :)

    Updates to Bind are provided by operating system vendors (e.g. CentOS, RedHat). You can find more information on this case at:

    RedHat Security - CVE-2013-4854

    You should be able to update Bind with your system package manager (YUM) when an update is made available by your OS vendor.

    Thank you.
     
    Stop hovering to collapse... Click to collapse... Hover to expand... Click to expand...
  5. cPanelMichael

    cPanelMichael Forums Analyst
    Staff Member

    Joined:
    Apr 11, 2011
    Messages:
    44,377
    Likes Received:
    1,857
    Trophy Points:
    363
    cPanel Access Level:
    Root Administrator
    Updated bind packages have been pushed out by Red Hat and CentOS to address this security concern. You can use your system package manager to update your system. EX:

    Code:
    yum update
    You should see the fix in the RPM change log after updating:

    Code:
    [~]# rpm -q --changelog bind | grep CVE-2013-4854
    - fix CVE-2013-4854
    Thank you.
     
    Stop hovering to collapse... Click to collapse... Hover to expand... Click to expand...
Loading...

Share This Page

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.
    Dismiss Notice