Anfälligkeitssuche        Suche in 219043 CVE Beschreibungen
und 99761 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.850168
Kategorie:SuSE Local Security Checks
Titel:SUSE: Security Advisory for bind (SUSE-SA:2011:029)
Zusammenfassung:The remote host is missing an update for the 'bind'; package(s) announced via the referenced advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'bind'
package(s) announced via the referenced advisory.

Vulnerability Insight:
A remote Denial of Service vulnerability has been fixed in the BIND
DNS nameserver.

Specially crafted packets could cause bind servers (recursive as well
as authoritative) to exit. CVE-2011-2464

This issue affected bind 9.6 and later, so SUSE Linux Enterprise
10 SP4, SUSE Linux Enterprise 11 SP1 and openSUSE 11.3 and 11.4
were affected.

Older service packs / products are not affected by CVE-2011-2464.


Please also note that the other currently published security issue,
CVE-2011-2465, affected only BIND versions 9.8.0 and later, which none
of our current products include, making all of them not affected by
this issue.

Vulnerability Impact:
remote denial of service

Affected Software/OS:
bind on openSUSE 11.3, openSUSE 11.4

Solution:
Please install the updated package(s).

CVSS Score:
5.0

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:P

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2011-2464
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html
BugTraq ID: 48566
http://www.securityfocus.com/bid/48566
Bugtraq: 20110705 Security Advisory: CVE-2011-2464 - ISC BIND 9 Remote packet Denial of Service against Authoritative and Recursive Servers (Google Search)
http://www.securityfocus.com/archive/1/518749/100/0/threaded
CERT/CC vulnerability note: VU#142646
http://www.kb.cert.org/vuls/id/142646
Debian Security Information: DSA-2272 (Google Search)
http://www.debian.org/security/2011/dsa-2272
http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062846.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062522.html
HPdes Security Advisory: HPSBUX02719
http://marc.info/?l=bugtraq&m=131983337229394&w=2
HPdes Security Advisory: SSRT100658
http://www.mandriva.com/security/advisories?name=MDVSA-2011:115
http://osvdb.org/73605
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13997
http://www.redhat.com/support/errata/RHSA-2011-0926.html
http://www.securitytracker.com/id?1025742
http://secunia.com/advisories/45082
http://secunia.com/advisories/45089
http://secunia.com/advisories/45143
http://secunia.com/advisories/45177
http://secunia.com/advisories/45185
http://secunia.com/advisories/45223
http://secunia.com/advisories/45410
http://secunia.com/advisories/45412
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.377171
SuSE Security Announcement: SUSE-SA:2011:029 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00002.html
SuSE Security Announcement: SUSE-SU-2011:0759 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00004.html
SuSE Security Announcement: openSUSE-SU-2011:0788 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00006.html
https://www.ubuntu.com/usn/USN-1163-1/
XForce ISS Database: iscbind-update-dos(68375)
https://exchange.xforce.ibmcloud.com/vulnerabilities/68375
Common Vulnerability Exposure (CVE) ID: CVE-2011-2465
BugTraq ID: 48565
http://www.securityfocus.com/bid/48565
Bugtraq: 20110705 Security Advisory: CVE-2011-2465 ISC BIND 9 Remote Crash with Certain RPZ Configurations (Google Search)
http://www.securityfocus.com/archive/1/518750/100/0/threaded
CERT/CC vulnerability note: VU#137968
http://www.kb.cert.org/vuls/id/137968
http://osvdb.org/73604
http://www.securitytracker.com/id?1025743
XForce ISS Database: iscbind-rpz-dos(68374)
https://exchange.xforce.ibmcloud.com/vulnerabilities/68374
CopyrightCopyright (C) 2011 Greenbone Networks GmbH

Dies ist nur einer von 99761 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2024 E-Soft Inc. Alle Rechte vorbehalten.