Anfälligkeitssuche        Suche in 219043 CVE Beschreibungen
und 99761 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.57889
Kategorie:Gentoo Local Security Checks
Titel:Gentoo Security Advisory GLSA 200609-11 (bind)
Zusammenfassung:NOSUMMARY
Beschreibung:Description:
The remote host is missing updates announced in
advisory GLSA 200609-11.

ISC BIND contains two vulnerabilities allowing a Denial of Service under
certain conditions.

Solution:
All BIND 9.3 users should update to the latest version:

# emerge --sync
# emerge --ask --oneshot --verbose '>=net-dns/bind-9.3.2-r4'

All BIND 9.2 users should update to the latest version:

# emerge --sync
# emerge --ask --oneshot --verbose '>=net-dns/bind-9.2.6-r4'

http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200609-11
http://bugs.gentoo.org/show_bug.cgi?id=146486

CVSS Score:
5.0

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:P

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2006-4095
http://lists.apple.com/archives/security-announce/2007/May/msg00004.html
BugTraq ID: 19859
http://www.securityfocus.com/bid/19859
Bugtraq: 20060908 rPSA-2006-0166-1 bind bind-utils (Google Search)
http://www.securityfocus.com/archive/1/445600/100/0/threaded
CERT/CC vulnerability note: VU#915404
http://www.kb.cert.org/vuls/id/915404
Debian Security Information: DSA-1172 (Google Search)
http://www.us.debian.org/security/2006/dsa-1172
FreeBSD Security Advisory: FreeBSD-SA-06:20.bind
http://security.freebsd.org/advisories/FreeBSD-SA-06:20.bind.asc
http://security.gentoo.org/glsa/glsa-200609-11.xml
HPdes Security Advisory: HPSBTU02207
https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144
HPdes Security Advisory: SSRT061213
HPdes Security Advisory: SSRT061239
HPdes Security Advisory: SSRT071304
http://www.mandriva.com/security/advisories?name=MDKSA-2006:163
http://www.niscc.gov.uk/niscc/docs/re-20060905-00590.pdf?lang=en
OpenBSD Security Advisory: [3.9] 20060908 010: SECURITY FIX: September 8, 2006
http://www.openbsd.org/errata.html
http://www.openpkg.com/security/advisories/OpenPKG-SA-2006.019.html
http://securitytracker.com/id?1016794
http://secunia.com/advisories/21752
http://secunia.com/advisories/21786
http://secunia.com/advisories/21816
http://secunia.com/advisories/21818
http://secunia.com/advisories/21828
http://secunia.com/advisories/21835
http://secunia.com/advisories/21838
http://secunia.com/advisories/21912
http://secunia.com/advisories/21926
http://secunia.com/advisories/22298
http://secunia.com/advisories/24950
http://secunia.com/advisories/25402
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.481241
SuSE Security Announcement: SUSE-SR:2006:023 (Google Search)
http://www.novell.com/linux/security/advisories/2006_23_sr.html
SuSE Security Announcement: SUSE-SR:2006:024 (Google Search)
http://www.novell.com/linux/security/advisories/2006_24_sr.html
http://www.ubuntu.com/usn/usn-343-1
http://www.vupen.com/english/advisories/2006/3473
http://www.vupen.com/english/advisories/2007/1401
http://www.vupen.com/english/advisories/2007/1939
XForce ISS Database: bind-dnssec-rrset-dos(28745)
https://exchange.xforce.ibmcloud.com/vulnerabilities/28745
Common Vulnerability Exposure (CVE) ID: CVE-2006-4096
AIX APAR: IY89169
http://www-1.ibm.com/support/docview.wss?uid=isg1IY89169
AIX APAR: IY89178
http://www-1.ibm.com/support/docview.wss?uid=isg1IY89178
CERT/CC vulnerability note: VU#697164
http://www.kb.cert.org/vuls/id/697164
HPdes Security Advisory: HPSBOV03226
http://marc.info/?l=bugtraq&m=141879471518471&w=2
HPdes Security Advisory: SSRT101004
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9623
http://secunia.com/advisories/21790
http://www.vupen.com/english/advisories/2006/3511
XForce ISS Database: bind-recursive-insist-dos(28744)
https://exchange.xforce.ibmcloud.com/vulnerabilities/28744
CopyrightCopyright (c) 2007 E-Soft Inc. http://www.securityspace.com

Dies ist nur einer von 99761 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2024 E-Soft Inc. Alle Rechte vorbehalten.