Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Summary
Title BIND: Denial of Service
Informations
Name GLSA-201401-34 First vendor Publication 2014-01-29
Vendor Gentoo Last vendor Modification 2014-01-29
Severity (Vendor) Normal Revision N/A

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:N/I:N/A:C)
Cvss Base Score 7.8 Attack Range Network
Cvss Impact Score 6.9 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Synopsis

Multiple vulnerabilities have been found in BIND, possibly resulting in Denial of Service.

Background

BIND is the Berkeley Internet Name Domain Server.

Description

Multiple vulnerabilities have been discovered in BIND. Please review the CVE identifiers referenced below for details.

Impact

A remote attacker may be able to cause a Denial of Service condition.

Workaround

There is no known workaround at this time.

Resolution

All BIND users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-dns/bind-9.9.4_p2"

References

[ 1 ] CVE-2012-5166 : http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5166
[ 2 ] CVE-2012-5688 : http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5688
[ 3 ] CVE-2012-5689 : http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5689
[ 4 ] CVE-2013-2266 : http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2266
[ 5 ] CVE-2013-3919 : http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3919
[ 6 ] CVE-2013-4854 : http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4854
[ 7 ] CVE-2014-0591 : http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0591

Availability

This GLSA and any updates to it are available for viewing at the Gentoo Security Website:

http://security.gentoo.org/glsa/glsa-201401-34.xml

Original Source

Url : http://security.gentoo.org/glsa/glsa-201401-34.xml

CWE : Common Weakness Enumeration

% Id Name
40 % CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer
40 % CWE-20 Improper Input Validation
20 % CWE-189 Numeric Errors (CWE/SANS Top 25)

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:18040
 
Oval ID: oval:org.mitre.oval:def:18040
Title: USN-1601-1 -- bind9 vulnerability
Description: Bind could be made to crash if it received specially crafted network traffic.
Family: unix Class: patch
Reference(s): USN-1601-1
CVE-2012-5166
Version: 5
Platform(s): Ubuntu 12.04
Ubuntu 11.10
Ubuntu 11.04
Ubuntu 10.04
Ubuntu 8.04
Product(s): bind9
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:18165
 
Oval ID: oval:org.mitre.oval:def:18165
Title: USN-1657-1 -- bind9 vulnerability
Description: Bind could be made to crash if it received specially crafted network traffic.
Family: unix Class: patch
Reference(s): USN-1657-1
CVE-2012-5688
Version: 5
Platform(s): Ubuntu 12.10
Ubuntu 12.04
Product(s): bind9
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:18255
 
Oval ID: oval:org.mitre.oval:def:18255
Title: USN-1783-1 -- bind9 vulnerability
Description: Bind could be made to consume memory or crash if it received specially crafted network traffic.
Family: unix Class: patch
Reference(s): USN-1783-1
CVE-2013-2266
Version: 5
Platform(s): Ubuntu 12.10
Ubuntu 12.04
Ubuntu 11.10
Ubuntu 10.04
Product(s): bind9
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:18438
 
Oval ID: oval:org.mitre.oval:def:18438
Title: USN-1910-1 -- bind9 vulnerability
Description: Bind could be made to crash if it received specially crafted network traffic.
Family: unix Class: patch
Reference(s): USN-1910-1
CVE-2013-4854
Version: 5
Platform(s): Ubuntu 13.04
Ubuntu 12.10
Ubuntu 12.04
Ubuntu 10.04
Product(s): bind9
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:18633
 
Oval ID: oval:org.mitre.oval:def:18633
Title: DSA-2728-1 bind9 - denial of service
Description: Maxim Shudrak and the HP Zero Day Initiative reported a denial of service vulnerability in BIND, a DNS server. A specially crafted query that includes malformed rdata can cause named daemon to terminate with an assertion failure while rejecting the malformed query.
Family: unix Class: patch
Reference(s): DSA-2728-1
CVE-2013-4854
Version: 7
Platform(s): Debian GNU/Linux 6.0
Debian GNU/Linux 7
Debian GNU/kFreeBSD 6.0
Debian GNU/kFreeBSD 7
Product(s): bind9
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:19159
 
Oval ID: oval:org.mitre.oval:def:19159
Title: DSA-2656-1 bind9 - denial of service
Description: Matthew Horsfall of Dyn, Inc. discovered that BIND, a DNS server, is prone to a denial of service vulnerability. A remote attacker could use this flaw to send a specially-crafted DNS query to named that, when processed, would cause named to use an excessive amount of memory, or possibly crash.
Family: unix Class: patch
Reference(s): DSA-2656-1
CVE-2013-2266
Version: 5
Platform(s): Debian GNU/Linux 6.0
Debian GNU/kFreeBSD 6.0
Product(s): bind9
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:19561
 
Oval ID: oval:org.mitre.oval:def:19561
Title: HP-UX Running BIND, Remote Denial of Service (DoS)
Description: The RFC 5011 implementation in rdata.c in ISC BIND 9.7.x and 9.8.x before 9.8.5-P2, 9.8.6b1, 9.9.x before 9.9.3-P2, and 9.9.4b1, and DNSco BIND 9.9.3-S1 before 9.9.3-S1-P1 and 9.9.4-S1b1, allows remote attackers to cause a denial of service (assertion failure and named daemon exit) via a query with a malformed RDATA section that is not properly handled during construction of a log message, as exploited in the wild in July 2013.
Family: unix Class: vulnerability
Reference(s): CVE-2013-4854
Version: 9
Platform(s): HP-UX 11
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:19579
 
Oval ID: oval:org.mitre.oval:def:19579
Title: HP-UX Running BIND, Remote Denial of Service (DoS)
Description: libdns in ISC BIND 9.7.x and 9.8.x before 9.8.4-P2, 9.8.5 before 9.8.5b2, 9.9.x before 9.9.2-P2, and 9.9.3 before 9.9.3b2 on UNIX platforms allows remote attackers to cause a denial of service (memory consumption) via a crafted regular expression, as demonstrated by a memory-exhaustion attack against a machine running a named process.
Family: unix Class: vulnerability
Reference(s): CVE-2013-2266
Version: 9
Platform(s): HP-UX 11
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:19706
 
Oval ID: oval:org.mitre.oval:def:19706
Title: Vulnerability in AIX bind
Description: ISC BIND 9.x before 9.7.6-P4, 9.8.x before 9.8.3-P4, 9.9.x before 9.9.1-P4, and 9.4-ESV and 9.6-ESV before 9.6-ESV-R7-P4 allows remote attackers to cause a denial of service (named daemon hang) via unspecified combinations of resource records.
Family: unix Class: vulnerability
Reference(s): CVE-2012-5166
Version: 5
Platform(s): IBM AIX 5.3
IBM AIX 6.1
IBM AIX 7.1
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:19809
 
Oval ID: oval:org.mitre.oval:def:19809
Title: HP-UX Running BIND, Remote Denial of Service (DoS), Authentication Bypass
Description: ISC BIND 9.x before 9.7.6-P4, 9.8.x before 9.8.3-P4, 9.9.x before 9.9.1-P4, and 9.4-ESV and 9.6-ESV before 9.6-ESV-R7-P4 allows remote attackers to cause a denial of service (named daemon hang) via unspecified combinations of resource records.
Family: unix Class: vulnerability
Reference(s): CVE-2012-5166
Version: 11
Platform(s): HP-UX 11
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:20024
 
Oval ID: oval:org.mitre.oval:def:20024
Title: DSA-2560-1 bind9 - denial of service
Description: It was discovered that BIND, a DNS server, hangs while constructing the additional section of a DNS reply, when certain combinations of resource records are present. This vulnerability affects both recursive and authoritative servers.
Family: unix Class: patch
Reference(s): DSA-2560-1
CVE-2012-5166
Version: 5
Platform(s): Debian GNU/Linux 6.0
Debian GNU/kFreeBSD 6.0
Product(s): bind9
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:20276
 
Oval ID: oval:org.mitre.oval:def:20276
Title: RHSA-2013:1115: bind97 security update (Important)
Description: The RFC 5011 implementation in rdata.c in ISC BIND 9.7.x and 9.8.x before 9.8.5-P2, 9.8.6b1, 9.9.x before 9.9.3-P2, and 9.9.4b1, and DNSco BIND 9.9.3-S1 before 9.9.3-S1-P1 and 9.9.4-S1b1, allows remote attackers to cause a denial of service (assertion failure and named daemon exit) via a query with a malformed RDATA section that is not properly handled during construction of a log message, as exploited in the wild in July 2013.
Family: unix Class: patch
Reference(s): RHSA-2013:1115-00
CESA-2013:1115
CVE-2013-4854
Version: 4
Platform(s): Red Hat Enterprise Linux 5
CentOS Linux 5
Product(s): bind97
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:20435
 
Oval ID: oval:org.mitre.oval:def:20435
Title: RHSA-2013:0689: bind security and bug fix update (Important)
Description: libdns in ISC BIND 9.7.x and 9.8.x before 9.8.4-P2, 9.8.5 before 9.8.5b2, 9.9.x before 9.9.2-P2, and 9.9.3 before 9.9.3b2 on UNIX platforms allows remote attackers to cause a denial of service (memory consumption) via a crafted regular expression, as demonstrated by a memory-exhaustion attack against a machine running a named process.
Family: unix Class: patch
Reference(s): RHSA-2013:0689-01
CESA-2013:0689
CVE-2013-2266
Version: 4
Platform(s): Red Hat Enterprise Linux 6
CentOS Linux 6
Product(s): bind
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:20851
 
Oval ID: oval:org.mitre.oval:def:20851
Title: RHSA-2013:0690: bind97 security update (Important)
Description: libdns in ISC BIND 9.7.x and 9.8.x before 9.8.4-P2, 9.8.5 before 9.8.5b2, 9.9.x before 9.9.2-P2, and 9.9.3 before 9.9.3b2 on UNIX platforms allows remote attackers to cause a denial of service (memory consumption) via a crafted regular expression, as demonstrated by a memory-exhaustion attack against a machine running a named process.
Family: unix Class: patch
Reference(s): RHSA-2013:0690-00
CESA-2013:0690
CVE-2013-2266
Version: 4
Platform(s): Red Hat Enterprise Linux 5
CentOS Linux 5
Product(s): bind97
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:21086
 
Oval ID: oval:org.mitre.oval:def:21086
Title: RHSA-2013:0550: bind security and enhancement update (Moderate)
Description: ISC BIND 9.8.x through 9.8.4-P1 and 9.9.x through 9.9.2-P1, in certain configurations involving DNS64 with a Response Policy Zone that lacks an AAAA rewrite rule, allows remote attackers to cause a denial of service (assertion failure and named daemon exit) via a query for an AAAA record.
Family: unix Class: patch
Reference(s): RHSA-2013:0550-01
CESA-2013:0550
CVE-2012-5689
Version: 4
Platform(s): Red Hat Enterprise Linux 6
CentOS Linux 6
Product(s): bind
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:21228
 
Oval ID: oval:org.mitre.oval:def:21228
Title: RHSA-2013:1114: bind security update (Important)
Description: The RFC 5011 implementation in rdata.c in ISC BIND 9.7.x and 9.8.x before 9.8.5-P2, 9.8.6b1, 9.9.x before 9.9.3-P2, and 9.9.4b1, and DNSco BIND 9.9.3-S1 before 9.9.3-S1-P1 and 9.9.4-S1b1, allows remote attackers to cause a denial of service (assertion failure and named daemon exit) via a query with a malformed RDATA section that is not properly handled during construction of a log message, as exploited in the wild in July 2013.
Family: unix Class: patch
Reference(s): RHSA-2013:1114-00
CESA-2013:1114
CVE-2013-4854
Version: 4
Platform(s): Red Hat Enterprise Linux 6
CentOS Linux 6
Product(s): bind
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:21231
 
Oval ID: oval:org.mitre.oval:def:21231
Title: RHSA-2012:1364: bind97 security update (Important)
Description: ISC BIND 9.x before 9.7.6-P4, 9.8.x before 9.8.3-P4, 9.9.x before 9.9.1-P4, and 9.4-ESV and 9.6-ESV before 9.6-ESV-R7-P4 allows remote attackers to cause a denial of service (named daemon hang) via unspecified combinations of resource records.
Family: unix Class: patch
Reference(s): RHSA-2012:1364-00
CESA-2012:1364
CVE-2012-5166
Version: 4
Platform(s): Red Hat Enterprise Linux 5
CentOS Linux 5
Product(s): bind97
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:21307
 
Oval ID: oval:org.mitre.oval:def:21307
Title: RHSA-2012:1363: bind security update (Important)
Description: ISC BIND 9.x before 9.7.6-P4, 9.8.x before 9.8.3-P4, 9.9.x before 9.9.1-P4, and 9.4-ESV and 9.6-ESV before 9.6-ESV-R7-P4 allows remote attackers to cause a denial of service (named daemon hang) via unspecified combinations of resource records.
Family: unix Class: patch
Reference(s): RHSA-2012:1363-01
CESA-2012:1363
CVE-2012-5166
Version: 4
Platform(s): Red Hat Enterprise Linux 5
Red Hat Enterprise Linux 6
CentOS Linux 5
CentOS Linux 6
Product(s): bind
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:21375
 
Oval ID: oval:org.mitre.oval:def:21375
Title: RHSA-2012:1549: bind security update (Important)
Description: ISC BIND 9.8.x before 9.8.4-P1 and 9.9.x before 9.9.2-P1, when DNS64 is enabled, allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a crafted query.
Family: unix Class: patch
Reference(s): RHSA-2012:1549-01
CESA-2012:1549
CVE-2012-5688
Version: 4
Platform(s): Red Hat Enterprise Linux 6
CentOS Linux 6
Product(s): bind
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:21748
 
Oval ID: oval:org.mitre.oval:def:21748
Title: RHSA-2014:0043: bind security update (Moderate)
Description: The query_findclosestnsec3 function in query.c in named in ISC BIND 9.6, 9.7, and 9.8 before 9.8.6-P2 and 9.9 before 9.9.4-P2, and 9.6-ESV before 9.6-ESV-R10-P2, allows remote attackers to cause a denial of service (INSIST assertion failure and daemon exit) via a crafted DNS query to an authoritative nameserver that uses the NSEC3 signing feature.
Family: unix Class: patch
Reference(s): RHSA-2014:0043-00
CESA-2014:0043
CVE-2014-0591
Version: 6
Platform(s): Red Hat Enterprise Linux 6
CentOS Linux 6
Product(s): bind
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:21969
 
Oval ID: oval:org.mitre.oval:def:21969
Title: HP-UX Running BIND, Remote Denial of Service (DoS)
Description: The query_findclosestnsec3 function in query.c in named in ISC BIND 9.6, 9.7, and 9.8 before 9.8.6-P2 and 9.9 before 9.9.4-P2, and 9.6-ESV before 9.6-ESV-R10-P2, allows remote attackers to cause a denial of service (INSIST assertion failure and daemon exit) via a crafted DNS query to an authoritative nameserver that uses the NSEC3 signing feature.
Family: unix Class: vulnerability
Reference(s): CVE-2014-0591
Version: 8
Platform(s): HP-UX 11
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:22439
 
Oval ID: oval:org.mitre.oval:def:22439
Title: USN-2081-1 -- bind9 vulnerability
Description: Bind could be made to crash if it received specially crafted network traffic.
Family: unix Class: patch
Reference(s): USN-2081-1
CVE-2014-0591
Version: 5
Platform(s): Ubuntu 13.10
Ubuntu 13.04
Ubuntu 12.10
Ubuntu 12.04
Ubuntu 10.04
Product(s): bind9
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:22810
 
Oval ID: oval:org.mitre.oval:def:22810
Title: DEPRECATED: ELSA-2012:1363: bind security update (Important)
Description: ISC BIND 9.x before 9.7.6-P4, 9.8.x before 9.8.3-P4, 9.9.x before 9.9.1-P4, and 9.4-ESV and 9.6-ESV before 9.6-ESV-R7-P4 allows remote attackers to cause a denial of service (named daemon hang) via unspecified combinations of resource records.
Family: unix Class: patch
Reference(s): ELSA-2012:1363-01
CVE-2012-5166
Version: 7
Platform(s): Oracle Linux 5
Oracle Linux 6
Product(s): bind
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:22902
 
Oval ID: oval:org.mitre.oval:def:22902
Title: ELSA-2013:1115: bind97 security update (Important)
Description: The RFC 5011 implementation in rdata.c in ISC BIND 9.7.x and 9.8.x before 9.8.5-P2, 9.8.6b1, 9.9.x before 9.9.3-P2, and 9.9.4b1, and DNSco BIND 9.9.3-S1 before 9.9.3-S1-P1 and 9.9.4-S1b1, allows remote attackers to cause a denial of service (assertion failure and named daemon exit) via a query with a malformed RDATA section that is not properly handled during construction of a log message, as exploited in the wild in July 2013.
Family: unix Class: patch
Reference(s): ELSA-2013:1115-00
CVE-2013-4854
Version: 6
Platform(s): Oracle Linux 5
Product(s): bind97
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:23024
 
Oval ID: oval:org.mitre.oval:def:23024
Title: ELSA-2013:0690: bind97 security update (Important)
Description: libdns in ISC BIND 9.7.x and 9.8.x before 9.8.4-P2, 9.8.5 before 9.8.5b2, 9.9.x before 9.9.2-P2, and 9.9.3 before 9.9.3b2 on UNIX platforms allows remote attackers to cause a denial of service (memory consumption) via a crafted regular expression, as demonstrated by a memory-exhaustion attack against a machine running a named process.
Family: unix Class: patch
Reference(s): ELSA-2013:0690-00
CVE-2013-2266
Version: 6
Platform(s): Oracle Linux 5
Product(s): bind97
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:23403
 
Oval ID: oval:org.mitre.oval:def:23403
Title: ELSA-2012:1364: bind97 security update (Important)
Description: ISC BIND 9.x before 9.7.6-P4, 9.8.x before 9.8.3-P4, 9.9.x before 9.9.1-P4, and 9.4-ESV and 9.6-ESV before 9.6-ESV-R7-P4 allows remote attackers to cause a denial of service (named daemon hang) via unspecified combinations of resource records.
Family: unix Class: patch
Reference(s): ELSA-2012:1364-00
CVE-2012-5166
Version: 6
Platform(s): Oracle Linux 5
Product(s): bind97
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:23576
 
Oval ID: oval:org.mitre.oval:def:23576
Title: ELSA-2013:0550: bind security and enhancement update (Moderate)
Description: ISC BIND 9.8.x through 9.8.4-P1 and 9.9.x through 9.9.2-P1, in certain configurations involving DNS64 with a Response Policy Zone that lacks an AAAA rewrite rule, allows remote attackers to cause a denial of service (assertion failure and named daemon exit) via a query for an AAAA record.
Family: unix Class: patch
Reference(s): ELSA-2013:0550-01
CVE-2012-5689
Version: 6
Platform(s): Oracle Linux 6
Product(s): bind
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:23643
 
Oval ID: oval:org.mitre.oval:def:23643
Title: ELSA-2012:1363: bind security update (Important)
Description: ISC BIND 9.x before 9.7.6-P4, 9.8.x before 9.8.3-P4, 9.9.x before 9.9.1-P4, and 9.4-ESV and 9.6-ESV before 9.6-ESV-R7-P4 allows remote attackers to cause a denial of service (named daemon hang) via unspecified combinations of resource records.
Family: unix Class: patch
Reference(s): ELSA-2012:1363-01
CVE-2012-5166
Version: 6
Platform(s): Oracle Linux 5
Oracle Linux 6
Product(s): bind
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:23678
 
Oval ID: oval:org.mitre.oval:def:23678
Title: ELSA-2012:1549: bind security update (Important)
Description: ISC BIND 9.8.x before 9.8.4-P1 and 9.9.x before 9.9.2-P1, when DNS64 is enabled, allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a crafted query.
Family: unix Class: patch
Reference(s): ELSA-2012:1549-01
CVE-2012-5688
Version: 6
Platform(s): Oracle Linux 6
Product(s): bind
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:23869
 
Oval ID: oval:org.mitre.oval:def:23869
Title: ELSA-2013:1114: bind security update (Important)
Description: The RFC 5011 implementation in rdata.c in ISC BIND 9.7.x and 9.8.x before 9.8.5-P2, 9.8.6b1, 9.9.x before 9.9.3-P2, and 9.9.4b1, and DNSco BIND 9.9.3-S1 before 9.9.3-S1-P1 and 9.9.4-S1b1, allows remote attackers to cause a denial of service (assertion failure and named daemon exit) via a query with a malformed RDATA section that is not properly handled during construction of a log message, as exploited in the wild in July 2013.
Family: unix Class: patch
Reference(s): ELSA-2013:1114-00
CVE-2013-4854
Version: 6
Platform(s): Oracle Linux 6
Product(s): bind
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:24052
 
Oval ID: oval:org.mitre.oval:def:24052
Title: ELSA-2013:0689: bind security and bug fix update (Important)
Description: libdns in ISC BIND 9.7.x and 9.8.x before 9.8.4-P2, 9.8.5 before 9.8.5b2, 9.9.x before 9.9.2-P2, and 9.9.3 before 9.9.3b2 on UNIX platforms allows remote attackers to cause a denial of service (memory consumption) via a crafted regular expression, as demonstrated by a memory-exhaustion attack against a machine running a named process.
Family: unix Class: patch
Reference(s): ELSA-2013:0689-01
CVE-2013-2266
Version: 6
Platform(s): Oracle Linux 6
Product(s): bind
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:24134
 
Oval ID: oval:org.mitre.oval:def:24134
Title: ELSA-2014:0043: bind security update (Moderate)
Description: The query_findclosestnsec3 function in query.c in named in ISC BIND 9.6, 9.7, and 9.8 before 9.8.6-P2 and 9.9 before 9.9.4-P2, and 9.6-ESV before 9.6-ESV-R10-P2, allows remote attackers to cause a denial of service (INSIST assertion failure and daemon exit) via a crafted DNS query to an authoritative nameserver that uses the NSEC3 signing feature.
Family: unix Class: patch
Reference(s): ELSA-2014:0043-00
CVE-2014-0591
Version: 6
Platform(s): Oracle Linux 6
Product(s): bind
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:25076
 
Oval ID: oval:org.mitre.oval:def:25076
Title: SUSE-SU-2013:1310-1 -- Security update for bind
Description: A specially crafted query with malicious rdata could have caused a crash (DoS) in named. Security Issue reference: * CVE-2013-4854 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4854 >
Family: unix Class: patch
Reference(s): SUSE-SU-2013:1310-1
CVE-2013-4854
Version: 3
Platform(s): SUSE Linux Enterprise Server 11
SUSE Linux Enterprise Desktop 11
Product(s): bind
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:25596
 
Oval ID: oval:org.mitre.oval:def:25596
Title: SUSE-SU-2014:0179-1 -- Security update for bind
Description: This update fixes a DoS vulnerability in bind when handling malformed NSEC3-signed zones. CVE-2014-0591 has been assigned to this issue.
Family: unix Class: patch
Reference(s): SUSE-SU-2014:0179-1
CVE-2014-0591
Version: 3
Platform(s): SUSE Linux Enterprise Server 11
SUSE Linux Enterprise Desktop 11
Product(s): bind
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:25966
 
Oval ID: oval:org.mitre.oval:def:25966
Title: SUSE-SU-2013:0696-1 -- Security update for dhcp
Description: The ISC DHCP server had a denial of service issue in handling specific DDNS requests which could cause a out of memory usage situation. (CVE-2013-2266) This update also adds a dhcp6-server service template for SuSEfirewall2 (bnc#783002) Security Issues: * CVE-2013-2266 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2266 >
Family: unix Class: patch
Reference(s): SUSE-SU-2013:0696-1
CVE-2013-2266
Version: 3
Platform(s): SUSE Linux Enterprise Server 11
SUSE Linux Enterprise Desktop 11
Product(s): dhcp
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:26030
 
Oval ID: oval:org.mitre.oval:def:26030
Title: RHSA-2014:1244: bind97 security and bug fix update (Moderate)
Description: The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. It contains a DNS server (named), a resolver library with routines for applications to use when interfacing with DNS, and tools for verifying that the DNS server is operating correctly. These packages contain version 9.7 of the BIND suite. A denial of service flaw was found in the way BIND handled queries for NSEC3-signed zones. A remote attacker could use this flaw against an authoritative name server that served NCES3-signed zones by sending a specially crafted query, which, when processed, would cause named to crash. (CVE-2014-0591) Note: The CVE-2014-0591 issue does not directly affect the version of bind97 shipped in Red Hat Enterprise Linux 5. This issue is being addressed however to assure it is not introduced in future builds of bind97 (possibly built with a different compiler or C library optimization).
Family: unix Class: patch
Reference(s): RHSA-2014:1244-00
CVE-2014-0591
CESA-2014:1244
Version: 5
Platform(s): Red Hat Enterprise Linux 5
CentOS Linux 5
Product(s): bind97
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:26656
 
Oval ID: oval:org.mitre.oval:def:26656
Title: DSA-3023-1 bind9 - security update
Description: Jared Mauch reported a denial of service flaw in the way BIND, a DNS server, handled queries for NSEC3-signed zones. A remote attacker could use this flaw against an authoritative name server that served NCES3-signed zones by sending a specially crafted query, which, when processed, would cause named to crash.
Family: unix Class: patch
Reference(s): DSA-3023-1
CVE-2014-0591
Version: 3
Platform(s): Debian GNU/Linux 7.0
Debian GNU/kFreeBSD 7.0
Product(s): bind9
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:26970
 
Oval ID: oval:org.mitre.oval:def:26970
Title: ELSA-2014-1244 -- bind97 security and bug fix update (Moderate)
Description: The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. It contains a DNS server (named), a resolver library with routines for applications to use when interfacing with DNS, and tools for verifying that the DNS server is operating correctly. These packages contain version 9.7 of the BIND suite. A denial of service flaw was found in the way BIND handled queries for NSEC3-signed zones. A remote attacker could use this flaw against an authoritative name server that served NCES3-signed zones by sending a specially crafted query, which, when processed, would cause named to crash. (CVE-2014-0591) Note: The CVE-2014-0591 issue does not directly affect the version of bind97 shipped in Red Hat Enterprise Linux 5. This issue is being addressed however to assure it is not introduced in future builds of bind97 (possibly built with a different compiler or C library optimization). This update also fixes the following bug: * Previously, the bind97 initscript did not check for the existence of the ROOTDIR variable when shutting down the named daemon. As a consequence, some parts of the file system that are mounted when using bind97 in a chroot environment were unmounted on daemon shut down, even if bind97 was not running in a chroot environment. With this update, the initscript has been fixed to check for the existence of the ROOTDIR variable when unmounting some parts of the file system on named daemon shut down. Now, when shutting down bind97 that is not running in a chroot environment, no parts of the file system are unmounted. (BZ#1059118) All bind97 users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. After installing the update, the BIND daemon (named) will be restarted automatically.
Family: unix Class: patch
Reference(s): ELSA-2014-1244
CVE-2014-0591
CVE-2013-4854
CVE-2013-2266
Version: 5
Platform(s): Oracle Linux 5
Product(s): bind97
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:27039
 
Oval ID: oval:org.mitre.oval:def:27039
Title: DEPRECATED: ELSA-2013-1115 -- bind97 security update (important)
Description: [32:9.7.0-17.P2.2] - fix for CVE-2013-4854
Family: unix Class: patch
Reference(s): ELSA-2013-1115
CVE-2013-4854
Version: 4
Platform(s): Oracle Linux 5
Product(s): bind97
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:27131
 
Oval ID: oval:org.mitre.oval:def:27131
Title: DEPRECATED: ELSA-2014-0043 -- bind security update (moderate)
Description: [32:9.8.2-0.23.rc1.1] - Fix CVE-2014-0591 [32:9.8.2-0.23.rc1] - Fix gssapictx memory leak (#911167) [32:9.8.2-0.22.rc1] - fix CVE-2013-4854 [32:9.8.2-0.21.rc1] - fix CVE-2013-2266 - ship dns/rrl.h in -devel subpkg [32:9.8.2-0.20.rc1] - remove one bogus file from /usr/share/doc, introduced by RRL patch [32:9.8.2-0.19.rc1] - fix CVE-2012-5689 [32:9.8.2-0.18.rc1] - add response rate limit patch (#873624)
Family: unix Class: patch
Reference(s): ELSA-2014-0043
CVE-2014-0591
Version: 5
Platform(s): Oracle Linux 6
Product(s): bind
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:27135
 
Oval ID: oval:org.mitre.oval:def:27135
Title: DEPRECATED: ELSA-2012-1364 -- bind97 security update (important)
Description: [32:9.7.0-10.P2.4] - fix CVE-2012-5166
Family: unix Class: patch
Reference(s): ELSA-2012-1364
CVE-2012-5166
Version: 4
Platform(s): Oracle Linux 5
Product(s): bind97
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:27480
 
Oval ID: oval:org.mitre.oval:def:27480
Title: DEPRECATED: ELSA-2013-0550 -- bind security and enhancement update (moderate)
Description: A flaw was found in the DNS64 implementation in BIND when using Response Policy Zones (RPZ). If a remote attacker sent a specially-crafted query to a named server that is using RPZ rewrite rules, named could exit unexpectedly with an assertion failure. Note that DNS64 support is not enabled by default.
Family: unix Class: patch
Reference(s): ELSA-2013-0550
CVE-2012-5689
Version: 4
Platform(s): Oracle Linux 6
Product(s): bind
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:27514
 
Oval ID: oval:org.mitre.oval:def:27514
Title: DEPRECATED: ELSA-2013-1114 -- bind security update (important)
Description: [32:9.8.2-0.17.rc1.0.2.el6_4.5] - bump release and build for ULN [32:9.8.2-0.17.rc1.5] - fix CVE-2013-4854
Family: unix Class: patch
Reference(s): ELSA-2013-1114
CVE-2013-4854
Version: 4
Platform(s): Oracle Linux 6
Product(s): bind
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:27538
 
Oval ID: oval:org.mitre.oval:def:27538
Title: DEPRECATED: ELSA-2013-0690 -- bind97 security update (important)
Description: [32:9.7.0-17.P2.1] - fix CVE-2013-2266
Family: unix Class: patch
Reference(s): ELSA-2013-0690
CVE-2013-2266
Version: 4
Platform(s): Oracle Linux 5
Product(s): bind97
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:27547
 
Oval ID: oval:org.mitre.oval:def:27547
Title: DEPRECATED: ELSA-2012-1363 -- bind security update (important)
Description: [32:9.8.2-0.10.rc1.5] - fix CVE-2012-5166
Family: unix Class: patch
Reference(s): ELSA-2012-1363
CVE-2012-5166
Version: 4
Platform(s): Oracle Linux 5
Oracle Linux 6
Product(s): bind
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:27627
 
Oval ID: oval:org.mitre.oval:def:27627
Title: DEPRECATED: ELSA-2012-1549 -- bind security update (important)
Description: [32:9.8.2-0.10.rc1.6] - fix CVE-2012-5688
Family: unix Class: patch
Reference(s): ELSA-2012-1549
CVE-2012-5688
Version: 4
Platform(s): Oracle Linux 6
Product(s): bind
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:27642
 
Oval ID: oval:org.mitre.oval:def:27642
Title: DEPRECATED: ELSA-2013-0689 -- bind security and bug fix update (important)
Description: [ 32:9.8.2-0.17.rc1.0.2.el6_4.4] - bump release and build for ULN
Family: unix Class: patch
Reference(s): ELSA-2013-0689
CVE-2013-2266
Version: 4
Platform(s): Oracle Linux 6
Product(s): bind
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 319
Application 2
Application 2
Os 4
Os 2
Os 12
Os 1
Os 1
Os 1
Os 1
Os 1
Os 2
Os 1
Os 1
Os 1
Os 1
Os 1
Os 1
Os 5

OpenVAS Exploits

Date Description
2012-12-31 Name : Fedora Update for bind FEDORA-2012-19822
File : nvt/gb_fedora_2012_19822_bind_fc16.nasl
2012-12-14 Name : Fedora Update for bind FEDORA-2012-19830
File : nvt/gb_fedora_2012_19830_bind_fc17.nasl
2012-12-13 Name : SuSE Update for bind openSUSE-SU-2012:1372-1 (bind)
File : nvt/gb_suse_2012_1372_1.nasl
2012-12-10 Name : Ubuntu Update for bind9 USN-1657-1
File : nvt/gb_ubuntu_USN_1657_1.nasl
2012-12-10 Name : CentOS Update for bind CESA-2012:1549 centos6
File : nvt/gb_CESA-2012_1549_bind_centos6.nasl
2012-12-10 Name : RedHat Update for bind RHSA-2012:1549-01
File : nvt/gb_RHSA-2012_1549-01_bind.nasl
2012-12-06 Name : Mandriva Update for bind MDVSA-2012:177 (bind)
File : nvt/gb_mandriva_MDVSA_2012_177.nasl
2012-10-29 Name : Debian Security Advisory DSA 2560-1 (bind9)
File : nvt/deb_2560_1.nasl
2012-10-23 Name : Fedora Update for dnsperf FEDORA-2012-15965
File : nvt/gb_fedora_2012_15965_dnsperf_fc17.nasl
2012-10-23 Name : Fedora Update for dnsperf FEDORA-2012-15981
File : nvt/gb_fedora_2012_15981_dnsperf_fc16.nasl
2012-10-23 Name : Fedora Update for dhcp FEDORA-2012-15981
File : nvt/gb_fedora_2012_15981_dhcp_fc16.nasl
2012-10-23 Name : Fedora Update for bind FEDORA-2012-15981
File : nvt/gb_fedora_2012_15981_bind_fc16.nasl
2012-10-23 Name : Fedora Update for bind-dyndb-ldap FEDORA-2012-15981
File : nvt/gb_fedora_2012_15981_bind-dyndb-ldap_fc16.nasl
2012-10-23 Name : Fedora Update for dhcp FEDORA-2012-15965
File : nvt/gb_fedora_2012_15965_dhcp_fc17.nasl
2012-10-23 Name : Fedora Update for bind FEDORA-2012-15965
File : nvt/gb_fedora_2012_15965_bind_fc17.nasl
2012-10-23 Name : Fedora Update for bind-dyndb-ldap FEDORA-2012-15965
File : nvt/gb_fedora_2012_15965_bind-dyndb-ldap_fc17.nasl
2012-10-16 Name : RedHat Update for bind97 RHSA-2012:1364-01
File : nvt/gb_RHSA-2012_1364-01_bind97.nasl
2012-10-16 Name : RedHat Update for bind RHSA-2012:1363-01
File : nvt/gb_RHSA-2012_1363-01_bind.nasl
2012-10-16 Name : CentOS Update for bind97 CESA-2012:1364 centos5
File : nvt/gb_CESA-2012_1364_bind97_centos5.nasl
2012-10-16 Name : CentOS Update for bind CESA-2012:1363 centos6
File : nvt/gb_CESA-2012_1363_bind_centos6.nasl
2012-10-16 Name : CentOS Update for bind CESA-2012:1363 centos5
File : nvt/gb_CESA-2012_1363_bind_centos5.nasl
2012-10-13 Name : FreeBSD Ports: bind99
File : nvt/freebsd_bind992.nasl
2012-10-11 Name : Mandriva Update for bind MDVSA-2012:162 (bind)
File : nvt/gb_mandriva_MDVSA_2012_162.nasl
2012-10-11 Name : Ubuntu Update for bind9 USN-1601-1
File : nvt/gb_ubuntu_USN_1601_1.nasl

Information Assurance Vulnerability Management (IAVM)

Date Description
2014-06-19 IAVM : 2014-A-0086 - Multiple Vulnerabilities in ISC BIND
Severity : Category I - VMSKEY : V0052635
2013-09-19 IAVM : 2013-A-0179 - Apple Mac OS X Security Update 2013-004
Severity : Category I - VMSKEY : V0040373
2013-08-01 IAVM : 2013-A-0151 - ISC BIND 9 Remote Denial of Service Vulnerability
Severity : Category I - VMSKEY : V0039823

Snort® IPS/IDS

Date Description
2017-12-19 ISC BIND 9 DNS rdata length handling remote denial of service attempt
RuleID : 44879 - Revision : 1 - Type : SERVER-OTHER
2014-03-27 ISC libdns client NAPTR record regular expression handling denial of service ...
RuleID : 29935 - Revision : 2 - Type : PROTOCOL-DNS
2014-01-10 ISC BIND 9 DNS rdata length handling remote denial of service attempt
RuleID : 27666 - Revision : 3 - Type : SERVER-OTHER
2014-01-10 ISC libdns client NAPTR record regular expression handling denial of service ...
RuleID : 26427 - Revision : 4 - Type : PROTOCOL-DNS
2014-01-10 ISC BIND NAPTR record regular expression handling denial of service attempt
RuleID : 26324 - Revision : 6 - Type : PROTOCOL-DNS

Nessus® Vulnerability Scanner

Date Description
2018-01-18 Name : The remote name server is prone to a denial of service attack.
File : bind9_993.nasl - Type : ACT_GATHER_INFO
2017-04-21 Name : The remote OracleVM host is missing one or more security updates.
File : oraclevm_OVMSA-2017-0066.nasl - Type : ACT_GATHER_INFO
2016-06-22 Name : The remote OracleVM host is missing one or more security updates.
File : oraclevm_OVMSA-2016-0055.nasl - Type : ACT_GATHER_INFO
2016-01-28 Name : The remote device is missing a vendor-supplied security patch.
File : f5_bigip_SOL14601.nasl - Type : ACT_GATHER_INFO
2015-07-29 Name : The remote Ubuntu host is missing a security-related patch.
File : ubuntu_USN-2693-1.nasl - Type : ACT_GATHER_INFO
2015-03-26 Name : The remote Debian host is missing a security update.
File : debian_DLA-48.nasl - Type : ACT_GATHER_INFO
2015-01-19 Name : The remote Solaris system is missing a security patch for third-party software.
File : solaris11_bind_20130129_2.nasl - Type : ACT_GATHER_INFO
2014-12-26 Name : The remote OracleVM host is missing one or more security updates.
File : oraclevm_OVMSA-2014-0084.nasl - Type : ACT_GATHER_INFO
2014-11-08 Name : The remote Red Hat host is missing a security update.
File : redhat-RHSA-2013-0746.nasl - Type : ACT_GATHER_INFO
2014-11-08 Name : The remote Red Hat host is missing a security update.
File : redhat-RHSA-2013-1181.nasl - Type : ACT_GATHER_INFO
2014-10-21 Name : The remote host is missing a security update for OS X Server.
File : macosx_server_4_0.nasl - Type : ACT_GATHER_INFO
2014-10-14 Name : The remote Scientific Linux host is missing one or more security updates.
File : sl_20140916_bind97_on_SL5_x.nasl - Type : ACT_GATHER_INFO
2014-10-10 Name : The remote device is missing a vendor-supplied security patch.
File : f5_bigip_SOL14201.nasl - Type : ACT_GATHER_INFO
2014-10-10 Name : The remote device is missing a vendor-supplied security patch.
File : f5_bigip_SOL14386.nasl - Type : ACT_GATHER_INFO
2014-10-10 Name : The remote device is missing a vendor-supplied security patch.
File : f5_bigip_SOL14613.nasl - Type : ACT_GATHER_INFO
2014-10-01 Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2014-1244.nasl - Type : ACT_GATHER_INFO
2014-09-18 Name : The remote Oracle Linux host is missing one or more security updates.
File : oraclelinux_ELSA-2014-1244.nasl - Type : ACT_GATHER_INFO
2014-09-16 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2014-1244.nasl - Type : ACT_GATHER_INFO
2014-09-12 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-3023.nasl - Type : ACT_GATHER_INFO
2014-06-25 Name : The remote Slackware host is missing a security update.
File : Slackware_SSA_2014-175-01.nasl - Type : ACT_GATHER_INFO
2014-06-18 Name : The remote host is affected by a denial of service vulnerability.
File : mcafee_firewall_enterprise_SB10052.nasl - Type : ACT_GATHER_INFO
2014-06-18 Name : The remote host is affected by a denial of service vulnerability.
File : mcafee_web_gateway_SB10052.nasl - Type : ACT_GATHER_INFO
2014-06-13 Name : The remote openSUSE host is missing a security update.
File : openSUSE-2012-716.nasl - Type : ACT_GATHER_INFO
2014-06-13 Name : The remote openSUSE host is missing a security update.
File : openSUSE-2012-853.nasl - Type : ACT_GATHER_INFO
2014-06-13 Name : The remote openSUSE host is missing a security update.
File : openSUSE-2013-296.nasl - Type : ACT_GATHER_INFO
2014-06-13 Name : The remote openSUSE host is missing a security update.
File : openSUSE-2013-297.nasl - Type : ACT_GATHER_INFO
2014-06-13 Name : The remote openSUSE host is missing a security update.
File : openSUSE-2013-302.nasl - Type : ACT_GATHER_INFO
2014-06-13 Name : The remote openSUSE host is missing a security update.
File : openSUSE-2013-303.nasl - Type : ACT_GATHER_INFO
2014-06-13 Name : The remote openSUSE host is missing a security update.
File : openSUSE-2013-654.nasl - Type : ACT_GATHER_INFO
2014-06-13 Name : The remote openSUSE host is missing a security update.
File : openSUSE-2014-110.nasl - Type : ACT_GATHER_INFO
2014-02-05 Name : The remote Amazon Linux AMI host is missing a security update.
File : ala_ALAS-2014-287.nasl - Type : ACT_GATHER_INFO
2014-02-01 Name : The remote SuSE 11 host is missing one or more security updates.
File : suse_11_bind-140127.nasl - Type : ACT_GATHER_INFO
2014-01-30 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201401-34.nasl - Type : ACT_GATHER_INFO
2014-01-29 Name : The remote Slackware host is missing a security update.
File : Slackware_SSA_2014-028-01.nasl - Type : ACT_GATHER_INFO
2014-01-22 Name : The remote Scientific Linux host is missing one or more security updates.
File : sl_20140120_bind_on_SL6_x.nasl - Type : ACT_GATHER_INFO
2014-01-21 Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2014-0043.nasl - Type : ACT_GATHER_INFO
2014-01-21 Name : The remote Oracle Linux host is missing one or more security updates.
File : oraclelinux_ELSA-2014-0043.nasl - Type : ACT_GATHER_INFO
2014-01-21 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2014-0043.nasl - Type : ACT_GATHER_INFO
2014-01-20 Name : The remote Fedora host is missing a security update.
File : fedora_2014-0811.nasl - Type : ACT_GATHER_INFO
2014-01-20 Name : The remote Fedora host is missing a security update.
File : fedora_2014-0858.nasl - Type : ACT_GATHER_INFO
2014-01-20 Name : The remote Mandriva Linux host is missing one or more security updates.
File : mandriva_MDVSA-2014-002.nasl - Type : ACT_GATHER_INFO
2014-01-14 Name : The remote name server may be affected by a denial of service vulnerability.
File : bind9_994_p2.nasl - Type : ACT_GATHER_INFO
2014-01-14 Name : The remote FreeBSD host is missing one or more security-related updates.
File : freebsd_pkg_cb252f017c4311e3b0a6005056a37f68.nasl - Type : ACT_GATHER_INFO
2014-01-14 Name : The remote Ubuntu host is missing a security-related patch.
File : ubuntu_USN-2081-1.nasl - Type : ACT_GATHER_INFO
2013-12-03 Name : The remote AIX host is missing a vendor-supplied security patch.
File : aix_U855334.nasl - Type : ACT_GATHER_INFO
2013-10-01 Name : The remote Amazon Linux AMI host is missing a security update.
File : ala_ALAS-2013-214.nasl - Type : ACT_GATHER_INFO
2013-09-13 Name : The remote host is missing a Mac OS X update that fixes several security issues.
File : macosx_10_8_5.nasl - Type : ACT_GATHER_INFO
2013-09-13 Name : The remote host is missing a Mac OS X update that fixes several security issues.
File : macosx_SecUpd2013-004.nasl - Type : ACT_GATHER_INFO
2013-09-04 Name : The remote Amazon Linux AMI host is missing a security update.
File : ala_ALAS-2012-138.nasl - Type : ACT_GATHER_INFO
2013-09-04 Name : The remote Amazon Linux AMI host is missing a security update.
File : ala_ALAS-2012-146.nasl - Type : ACT_GATHER_INFO
2013-09-04 Name : The remote Amazon Linux AMI host is missing a security update.
File : ala_ALAS-2013-158.nasl - Type : ACT_GATHER_INFO
2013-09-04 Name : The remote Amazon Linux AMI host is missing a security update.
File : ala_ALAS-2013-176.nasl - Type : ACT_GATHER_INFO
2013-08-08 Name : The remote SuSE 11 host is missing one or more security updates.
File : suse_11_bind-130805.nasl - Type : ACT_GATHER_INFO
2013-08-07 Name : The remote Slackware host is missing a security update.
File : Slackware_SSA_2013-218-01.nasl - Type : ACT_GATHER_INFO
2013-08-05 Name : The remote Fedora host is missing a security update.
File : fedora_2013-13831.nasl - Type : ACT_GATHER_INFO
2013-08-05 Name : The remote Fedora host is missing a security update.
File : fedora_2013-13863.nasl - Type : ACT_GATHER_INFO
2013-07-31 Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2013-1114.nasl - Type : ACT_GATHER_INFO
2013-07-31 Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2013-1115.nasl - Type : ACT_GATHER_INFO
2013-07-31 Name : The remote Oracle Linux host is missing one or more security updates.
File : oraclelinux_ELSA-2013-1114.nasl - Type : ACT_GATHER_INFO
2013-07-31 Name : The remote Oracle Linux host is missing one or more security updates.
File : oraclelinux_ELSA-2013-1115.nasl - Type : ACT_GATHER_INFO
2013-07-31 Name : The remote Scientific Linux host is missing one or more security updates.
File : sl_20130730_bind97_on_SL5_x.nasl - Type : ACT_GATHER_INFO
2013-07-31 Name : The remote Scientific Linux host is missing one or more security updates.
File : sl_20130730_bind_on_SL6_x.nasl - Type : ACT_GATHER_INFO
2013-07-30 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2013-1114.nasl - Type : ACT_GATHER_INFO
2013-07-30 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2013-1115.nasl - Type : ACT_GATHER_INFO
2013-07-30 Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-1910-1.nasl - Type : ACT_GATHER_INFO
2013-07-29 Name : The remote name server is prone to a denial of service attack.
File : bind9_993_p2.nasl - Type : ACT_GATHER_INFO
2013-07-29 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-2728.nasl - Type : ACT_GATHER_INFO
2013-07-29 Name : The remote Mandriva Linux host is missing one or more security updates.
File : mandriva_MDVSA-2013-202.nasl - Type : ACT_GATHER_INFO
2013-07-28 Name : The remote FreeBSD host is missing one or more security-related updates.
File : freebsd_pkg_7943e521f64811e286073c970e169bc2.nasl - Type : ACT_GATHER_INFO
2013-07-12 Name : The remote Fedora host is missing a security update.
File : fedora_2013-9984.nasl - Type : ACT_GATHER_INFO
2013-07-12 Name : The remote Oracle Linux host is missing one or more security updates.
File : oraclelinux_ELSA-2012-1363.nasl - Type : ACT_GATHER_INFO
2013-07-12 Name : The remote Oracle Linux host is missing one or more security updates.
File : oraclelinux_ELSA-2012-1364.nasl - Type : ACT_GATHER_INFO
2013-07-12 Name : The remote Oracle Linux host is missing one or more security updates.
File : oraclelinux_ELSA-2012-1365.nasl - Type : ACT_GATHER_INFO
2013-07-12 Name : The remote Oracle Linux host is missing one or more security updates.
File : oraclelinux_ELSA-2012-1549.nasl - Type : ACT_GATHER_INFO
2013-07-12 Name : The remote Oracle Linux host is missing one or more security updates.
File : oraclelinux_ELSA-2013-0550.nasl - Type : ACT_GATHER_INFO
2013-07-12 Name : The remote Oracle Linux host is missing one or more security updates.
File : oraclelinux_ELSA-2013-0689.nasl - Type : ACT_GATHER_INFO
2013-07-12 Name : The remote Oracle Linux host is missing one or more security updates.
File : oraclelinux_ELSA-2013-0690.nasl - Type : ACT_GATHER_INFO
2013-06-29 Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2013-0689.nasl - Type : ACT_GATHER_INFO
2013-06-07 Name : The remote name server is prone to a denial of service attack.
File : bind9_993_p1.nasl - Type : ACT_GATHER_INFO
2013-06-07 Name : The remote FreeBSD host is missing one or more security-related updates.
File : freebsd_pkg_72f35727ce8311e2be04005056a37f68.nasl - Type : ACT_GATHER_INFO
2013-05-01 Name : The remote AIX host is missing a vendor-supplied security patch.
File : aix_U855824.nasl - Type : ACT_GATHER_INFO
2013-05-01 Name : The remote AIX host is missing a vendor-supplied security patch.
File : aix_U857842.nasl - Type : ACT_GATHER_INFO
2013-04-20 Name : The remote Mandriva Linux host is missing one or more security updates.
File : mandriva_MDVSA-2013-058.nasl - Type : ACT_GATHER_INFO
2013-04-20 Name : The remote Mandriva Linux host is missing one or more security updates.
File : mandriva_MDVSA-2013-059.nasl - Type : ACT_GATHER_INFO
2013-04-18 Name : The remote SuSE 11 host is missing one or more security updates.
File : suse_11_dhcp-130327.nasl - Type : ACT_GATHER_INFO
2013-04-14 Name : The remote FreeBSD host is missing one or more security-related updates.
File : freebsd_pkg_4b79538ba45011e29898001060e06fd4.nasl - Type : ACT_GATHER_INFO
2013-04-08 Name : The remote Fedora host is missing a security update.
File : fedora_2013-4533.nasl - Type : ACT_GATHER_INFO
2013-04-08 Name : The remote FreeBSD host is missing one or more security-related updates.
File : freebsd_pkg_13031d989bd111e2a7be8c705af55518.nasl - Type : ACT_GATHER_INFO
2013-04-08 Name : The remote FreeBSD host is missing one or more security-related updates.
File : freebsd_pkg_7a282e4995b611e284330800273fe665.nasl - Type : ACT_GATHER_INFO
2013-04-07 Name : The remote Fedora host is missing a security update.
File : fedora_2013-4525.nasl - Type : ACT_GATHER_INFO
2013-04-01 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-2656.nasl - Type : ACT_GATHER_INFO
2013-04-01 Name : The remote Scientific Linux host is missing one or more security updates.
File : sl_20130328_bind97_on_SL5_x.nasl - Type : ACT_GATHER_INFO
2013-04-01 Name : The remote Scientific Linux host is missing one or more security updates.
File : sl_20130328_bind_on_SL6_x.nasl - Type : ACT_GATHER_INFO
2013-04-01 Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-1783-1.nasl - Type : ACT_GATHER_INFO
2013-03-29 Name : The remote name server is prone to a denial of service attack.
File : bind9_992_p2.nasl - Type : ACT_GATHER_INFO
2013-03-29 Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2013-0690.nasl - Type : ACT_GATHER_INFO
2013-03-29 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2013-0689.nasl - Type : ACT_GATHER_INFO
2013-03-29 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2013-0690.nasl - Type : ACT_GATHER_INFO
2013-03-28 Name : The remote Slackware host is missing a security update.
File : Slackware_SSA_2013-086-01.nasl - Type : ACT_GATHER_INFO
2013-03-28 Name : The remote Slackware host is missing a security update.
File : Slackware_SSA_2013-086-02.nasl - Type : ACT_GATHER_INFO
2013-03-28 Name : The remote AIX host is missing a vendor-supplied security patch.
File : aix_U854646.nasl - Type : ACT_GATHER_INFO
2013-03-28 Name : The remote AIX host is missing a vendor-supplied security patch.
File : aix_U854732.nasl - Type : ACT_GATHER_INFO
2013-03-10 Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2013-0550.nasl - Type : ACT_GATHER_INFO
2013-03-01 Name : The remote Scientific Linux host is missing one or more security updates.
File : sl_20130221_bind_on_SL6_x.nasl - Type : ACT_GATHER_INFO
2013-02-22 Name : The remote FreeBSD host is missing one or more security-related updates.
File : freebsd_pkg_4671cdc97c6d11e2809b6c626d99876c.nasl - Type : ACT_GATHER_INFO
2013-02-22 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2013-0550.nasl - Type : ACT_GATHER_INFO
2013-01-25 Name : The remote SuSE 11 host is missing one or more security updates.
File : suse_11_bind-121015.nasl - Type : ACT_GATHER_INFO
2013-01-24 Name : The remote AIX host is missing a security patch.
File : aix_IV30364.nasl - Type : ACT_GATHER_INFO
2013-01-24 Name : The remote AIX host is missing a security patch.
File : aix_IV30365.nasl - Type : ACT_GATHER_INFO
2013-01-24 Name : The remote AIX host is missing a security patch.
File : aix_IV30366.nasl - Type : ACT_GATHER_INFO
2013-01-24 Name : The remote AIX host is missing a security patch.
File : aix_IV30367.nasl - Type : ACT_GATHER_INFO
2013-01-24 Name : The remote AIX host is missing a security patch.
File : aix_IV30368.nasl - Type : ACT_GATHER_INFO
2012-12-31 Name : The remote Fedora host is missing a security update.
File : fedora_2012-19822.nasl - Type : ACT_GATHER_INFO
2012-12-13 Name : The remote Fedora host is missing a security update.
File : fedora_2012-19830.nasl - Type : ACT_GATHER_INFO
2012-12-11 Name : The remote Fedora host is missing a security update.
File : fedora_2012-19777.nasl - Type : ACT_GATHER_INFO
2012-12-09 Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2012-1549.nasl - Type : ACT_GATHER_INFO
2012-12-09 Name : The remote Scientific Linux host is missing one or more security updates.
File : sl_20121206_bind_on_SL6_x.nasl - Type : ACT_GATHER_INFO
2012-12-07 Name : The remote Slackware host is missing a security update.
File : Slackware_SSA_2012-341-01.nasl - Type : ACT_GATHER_INFO
2012-12-07 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2012-1549.nasl - Type : ACT_GATHER_INFO
2012-12-07 Name : The remote Ubuntu host is missing a security-related patch.
File : ubuntu_USN-1657-1.nasl - Type : ACT_GATHER_INFO
2012-12-06 Name : The remote name server is prone to a denial of service attack.
File : bind9_992_p1.nasl - Type : ACT_GATHER_INFO
2012-12-06 Name : The remote FreeBSD host is missing one or more security-related updates.
File : freebsd_pkg_2892a8e23d6811e28e010800273fe665.nasl - Type : ACT_GATHER_INFO
2012-12-06 Name : The remote Mandriva Linux host is missing one or more security updates.
File : mandriva_MDVSA-2012-177.nasl - Type : ACT_GATHER_INFO
2012-10-23 Name : The remote Fedora host is missing one or more security updates.
File : fedora_2012-15981.nasl - Type : ACT_GATHER_INFO
2012-10-22 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-2560.nasl - Type : ACT_GATHER_INFO
2012-10-22 Name : The remote Fedora host is missing one or more security updates.
File : fedora_2012-15965.nasl - Type : ACT_GATHER_INFO
2012-10-22 Name : The remote Fedora host is missing one or more security updates.
File : fedora_2012-16022.nasl - Type : ACT_GATHER_INFO
2012-10-16 Name : The remote name server may be affected by a denial of service vulnerability.
File : bind9_991_p4.nasl - Type : ACT_GATHER_INFO
2012-10-16 Name : The remote Scientific Linux host is missing one or more security updates.
File : sl_20121012_bind97_on_SL5_x.nasl - Type : ACT_GATHER_INFO
2012-10-16 Name : The remote Scientific Linux host is missing one or more security updates.
File : sl_20121012_bind_on_SL5_x.nasl - Type : ACT_GATHER_INFO
2012-10-15 Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2012-1363.nasl - Type : ACT_GATHER_INFO
2012-10-15 Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2012-1364.nasl - Type : ACT_GATHER_INFO
2012-10-15 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2012-1363.nasl - Type : ACT_GATHER_INFO
2012-10-15 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2012-1364.nasl - Type : ACT_GATHER_INFO
2012-10-11 Name : The remote FreeBSD host is missing one or more security-related updates.
File : freebsd_pkg_57a700f912c011e29f86001d923933b6.nasl - Type : ACT_GATHER_INFO
2012-10-11 Name : The remote Mandriva Linux host is missing one or more security updates.
File : mandriva_MDVSA-2012-162.nasl - Type : ACT_GATHER_INFO
2012-10-11 Name : The remote Ubuntu host is missing a security-related patch.
File : ubuntu_USN-1601-1.nasl - Type : ACT_GATHER_INFO
2007-06-18 Name : The remote host is missing Sun Security Patch number 119783-40
File : solaris10_119783.nasl - Type : ACT_GATHER_INFO
2007-06-18 Name : The remote host is missing Sun Security Patch number 119784-40
File : solaris10_x86_119784.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
Date Informations
2014-02-17 11:38:07
  • Multiple Updates
2014-01-30 00:18:15
  • First insertion