Executive Summary
Summary | |
---|---|
Title | BIND: Denial of Service |
Informations | |||
---|---|---|---|
Name | GLSA-201401-34 | First vendor Publication | 2014-01-29 |
Vendor | Gentoo | Last vendor Modification | 2014-01-29 |
Severity (Vendor) | Normal | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:N/I:N/A:C) | |||
---|---|---|---|
Cvss Base Score | 7.8 | Attack Range | Network |
Cvss Impact Score | 6.9 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Synopsis Multiple vulnerabilities have been found in BIND, possibly resulting in Denial of Service. Background Description Impact Workaround Resolution References Availability http://security.gentoo.org/glsa/glsa-201401-34.xml |
Original Source
Url : http://security.gentoo.org/glsa/glsa-201401-34.xml |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
40 % | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
40 % | CWE-20 | Improper Input Validation |
20 % | CWE-189 | Numeric Errors (CWE/SANS Top 25) |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:18040 | |||
Oval ID: | oval:org.mitre.oval:def:18040 | ||
Title: | USN-1601-1 -- bind9 vulnerability | ||
Description: | Bind could be made to crash if it received specially crafted network traffic. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1601-1 CVE-2012-5166 | Version: | 5 |
Platform(s): | Ubuntu 12.04 Ubuntu 11.10 Ubuntu 11.04 Ubuntu 10.04 Ubuntu 8.04 | Product(s): | bind9 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:18165 | |||
Oval ID: | oval:org.mitre.oval:def:18165 | ||
Title: | USN-1657-1 -- bind9 vulnerability | ||
Description: | Bind could be made to crash if it received specially crafted network traffic. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1657-1 CVE-2012-5688 | Version: | 5 |
Platform(s): | Ubuntu 12.10 Ubuntu 12.04 | Product(s): | bind9 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:18255 | |||
Oval ID: | oval:org.mitre.oval:def:18255 | ||
Title: | USN-1783-1 -- bind9 vulnerability | ||
Description: | Bind could be made to consume memory or crash if it received specially crafted network traffic. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1783-1 CVE-2013-2266 | Version: | 5 |
Platform(s): | Ubuntu 12.10 Ubuntu 12.04 Ubuntu 11.10 Ubuntu 10.04 | Product(s): | bind9 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:18438 | |||
Oval ID: | oval:org.mitre.oval:def:18438 | ||
Title: | USN-1910-1 -- bind9 vulnerability | ||
Description: | Bind could be made to crash if it received specially crafted network traffic. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1910-1 CVE-2013-4854 | Version: | 5 |
Platform(s): | Ubuntu 13.04 Ubuntu 12.10 Ubuntu 12.04 Ubuntu 10.04 | Product(s): | bind9 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:18633 | |||
Oval ID: | oval:org.mitre.oval:def:18633 | ||
Title: | DSA-2728-1 bind9 - denial of service | ||
Description: | Maxim Shudrak and the HP Zero Day Initiative reported a denial of service vulnerability in BIND, a DNS server. A specially crafted query that includes malformed rdata can cause named daemon to terminate with an assertion failure while rejecting the malformed query. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-2728-1 CVE-2013-4854 | Version: | 7 |
Platform(s): | Debian GNU/Linux 6.0 Debian GNU/Linux 7 Debian GNU/kFreeBSD 6.0 Debian GNU/kFreeBSD 7 | Product(s): | bind9 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:19159 | |||
Oval ID: | oval:org.mitre.oval:def:19159 | ||
Title: | DSA-2656-1 bind9 - denial of service | ||
Description: | Matthew Horsfall of Dyn, Inc. discovered that BIND, a DNS server, is prone to a denial of service vulnerability. A remote attacker could use this flaw to send a specially-crafted DNS query to named that, when processed, would cause named to use an excessive amount of memory, or possibly crash. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-2656-1 CVE-2013-2266 | Version: | 5 |
Platform(s): | Debian GNU/Linux 6.0 Debian GNU/kFreeBSD 6.0 | Product(s): | bind9 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:19561 | |||
Oval ID: | oval:org.mitre.oval:def:19561 | ||
Title: | HP-UX Running BIND, Remote Denial of Service (DoS) | ||
Description: | The RFC 5011 implementation in rdata.c in ISC BIND 9.7.x and 9.8.x before 9.8.5-P2, 9.8.6b1, 9.9.x before 9.9.3-P2, and 9.9.4b1, and DNSco BIND 9.9.3-S1 before 9.9.3-S1-P1 and 9.9.4-S1b1, allows remote attackers to cause a denial of service (assertion failure and named daemon exit) via a query with a malformed RDATA section that is not properly handled during construction of a log message, as exploited in the wild in July 2013. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2013-4854 | Version: | 9 |
Platform(s): | HP-UX 11 | Product(s): | |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:19579 | |||
Oval ID: | oval:org.mitre.oval:def:19579 | ||
Title: | HP-UX Running BIND, Remote Denial of Service (DoS) | ||
Description: | libdns in ISC BIND 9.7.x and 9.8.x before 9.8.4-P2, 9.8.5 before 9.8.5b2, 9.9.x before 9.9.2-P2, and 9.9.3 before 9.9.3b2 on UNIX platforms allows remote attackers to cause a denial of service (memory consumption) via a crafted regular expression, as demonstrated by a memory-exhaustion attack against a machine running a named process. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2013-2266 | Version: | 9 |
Platform(s): | HP-UX 11 | Product(s): | |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:19706 | |||
Oval ID: | oval:org.mitre.oval:def:19706 | ||
Title: | Vulnerability in AIX bind | ||
Description: | ISC BIND 9.x before 9.7.6-P4, 9.8.x before 9.8.3-P4, 9.9.x before 9.9.1-P4, and 9.4-ESV and 9.6-ESV before 9.6-ESV-R7-P4 allows remote attackers to cause a denial of service (named daemon hang) via unspecified combinations of resource records. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2012-5166 | Version: | 5 |
Platform(s): | IBM AIX 5.3 IBM AIX 6.1 IBM AIX 7.1 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:19809 | |||
Oval ID: | oval:org.mitre.oval:def:19809 | ||
Title: | HP-UX Running BIND, Remote Denial of Service (DoS), Authentication Bypass | ||
Description: | ISC BIND 9.x before 9.7.6-P4, 9.8.x before 9.8.3-P4, 9.9.x before 9.9.1-P4, and 9.4-ESV and 9.6-ESV before 9.6-ESV-R7-P4 allows remote attackers to cause a denial of service (named daemon hang) via unspecified combinations of resource records. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2012-5166 | Version: | 11 |
Platform(s): | HP-UX 11 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:20024 | |||
Oval ID: | oval:org.mitre.oval:def:20024 | ||
Title: | DSA-2560-1 bind9 - denial of service | ||
Description: | It was discovered that BIND, a DNS server, hangs while constructing the additional section of a DNS reply, when certain combinations of resource records are present. This vulnerability affects both recursive and authoritative servers. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-2560-1 CVE-2012-5166 | Version: | 5 |
Platform(s): | Debian GNU/Linux 6.0 Debian GNU/kFreeBSD 6.0 | Product(s): | bind9 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:20276 | |||
Oval ID: | oval:org.mitre.oval:def:20276 | ||
Title: | RHSA-2013:1115: bind97 security update (Important) | ||
Description: | The RFC 5011 implementation in rdata.c in ISC BIND 9.7.x and 9.8.x before 9.8.5-P2, 9.8.6b1, 9.9.x before 9.9.3-P2, and 9.9.4b1, and DNSco BIND 9.9.3-S1 before 9.9.3-S1-P1 and 9.9.4-S1b1, allows remote attackers to cause a denial of service (assertion failure and named daemon exit) via a query with a malformed RDATA section that is not properly handled during construction of a log message, as exploited in the wild in July 2013. | ||
Family: | unix | Class: | patch |
Reference(s): | RHSA-2013:1115-00 CESA-2013:1115 CVE-2013-4854 | Version: | 4 |
Platform(s): | Red Hat Enterprise Linux 5 CentOS Linux 5 | Product(s): | bind97 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:20435 | |||
Oval ID: | oval:org.mitre.oval:def:20435 | ||
Title: | RHSA-2013:0689: bind security and bug fix update (Important) | ||
Description: | libdns in ISC BIND 9.7.x and 9.8.x before 9.8.4-P2, 9.8.5 before 9.8.5b2, 9.9.x before 9.9.2-P2, and 9.9.3 before 9.9.3b2 on UNIX platforms allows remote attackers to cause a denial of service (memory consumption) via a crafted regular expression, as demonstrated by a memory-exhaustion attack against a machine running a named process. | ||
Family: | unix | Class: | patch |
Reference(s): | RHSA-2013:0689-01 CESA-2013:0689 CVE-2013-2266 | Version: | 4 |
Platform(s): | Red Hat Enterprise Linux 6 CentOS Linux 6 | Product(s): | bind |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:20851 | |||
Oval ID: | oval:org.mitre.oval:def:20851 | ||
Title: | RHSA-2013:0690: bind97 security update (Important) | ||
Description: | libdns in ISC BIND 9.7.x and 9.8.x before 9.8.4-P2, 9.8.5 before 9.8.5b2, 9.9.x before 9.9.2-P2, and 9.9.3 before 9.9.3b2 on UNIX platforms allows remote attackers to cause a denial of service (memory consumption) via a crafted regular expression, as demonstrated by a memory-exhaustion attack against a machine running a named process. | ||
Family: | unix | Class: | patch |
Reference(s): | RHSA-2013:0690-00 CESA-2013:0690 CVE-2013-2266 | Version: | 4 |
Platform(s): | Red Hat Enterprise Linux 5 CentOS Linux 5 | Product(s): | bind97 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:21086 | |||
Oval ID: | oval:org.mitre.oval:def:21086 | ||
Title: | RHSA-2013:0550: bind security and enhancement update (Moderate) | ||
Description: | ISC BIND 9.8.x through 9.8.4-P1 and 9.9.x through 9.9.2-P1, in certain configurations involving DNS64 with a Response Policy Zone that lacks an AAAA rewrite rule, allows remote attackers to cause a denial of service (assertion failure and named daemon exit) via a query for an AAAA record. | ||
Family: | unix | Class: | patch |
Reference(s): | RHSA-2013:0550-01 CESA-2013:0550 CVE-2012-5689 | Version: | 4 |
Platform(s): | Red Hat Enterprise Linux 6 CentOS Linux 6 | Product(s): | bind |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:21228 | |||
Oval ID: | oval:org.mitre.oval:def:21228 | ||
Title: | RHSA-2013:1114: bind security update (Important) | ||
Description: | The RFC 5011 implementation in rdata.c in ISC BIND 9.7.x and 9.8.x before 9.8.5-P2, 9.8.6b1, 9.9.x before 9.9.3-P2, and 9.9.4b1, and DNSco BIND 9.9.3-S1 before 9.9.3-S1-P1 and 9.9.4-S1b1, allows remote attackers to cause a denial of service (assertion failure and named daemon exit) via a query with a malformed RDATA section that is not properly handled during construction of a log message, as exploited in the wild in July 2013. | ||
Family: | unix | Class: | patch |
Reference(s): | RHSA-2013:1114-00 CESA-2013:1114 CVE-2013-4854 | Version: | 4 |
Platform(s): | Red Hat Enterprise Linux 6 CentOS Linux 6 | Product(s): | bind |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:21231 | |||
Oval ID: | oval:org.mitre.oval:def:21231 | ||
Title: | RHSA-2012:1364: bind97 security update (Important) | ||
Description: | ISC BIND 9.x before 9.7.6-P4, 9.8.x before 9.8.3-P4, 9.9.x before 9.9.1-P4, and 9.4-ESV and 9.6-ESV before 9.6-ESV-R7-P4 allows remote attackers to cause a denial of service (named daemon hang) via unspecified combinations of resource records. | ||
Family: | unix | Class: | patch |
Reference(s): | RHSA-2012:1364-00 CESA-2012:1364 CVE-2012-5166 | Version: | 4 |
Platform(s): | Red Hat Enterprise Linux 5 CentOS Linux 5 | Product(s): | bind97 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:21375 | |||
Oval ID: | oval:org.mitre.oval:def:21375 | ||
Title: | RHSA-2012:1549: bind security update (Important) | ||
Description: | ISC BIND 9.8.x before 9.8.4-P1 and 9.9.x before 9.9.2-P1, when DNS64 is enabled, allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a crafted query. | ||
Family: | unix | Class: | patch |
Reference(s): | RHSA-2012:1549-01 CESA-2012:1549 CVE-2012-5688 | Version: | 4 |
Platform(s): | Red Hat Enterprise Linux 6 CentOS Linux 6 | Product(s): | bind |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:21748 | |||
Oval ID: | oval:org.mitre.oval:def:21748 | ||
Title: | RHSA-2014:0043: bind security update (Moderate) | ||
Description: | The query_findclosestnsec3 function in query.c in named in ISC BIND 9.6, 9.7, and 9.8 before 9.8.6-P2 and 9.9 before 9.9.4-P2, and 9.6-ESV before 9.6-ESV-R10-P2, allows remote attackers to cause a denial of service (INSIST assertion failure and daemon exit) via a crafted DNS query to an authoritative nameserver that uses the NSEC3 signing feature. | ||
Family: | unix | Class: | patch |
Reference(s): | RHSA-2014:0043-00 CESA-2014:0043 CVE-2014-0591 | Version: | 6 |
Platform(s): | Red Hat Enterprise Linux 6 CentOS Linux 6 | Product(s): | bind |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:21969 | |||
Oval ID: | oval:org.mitre.oval:def:21969 | ||
Title: | HP-UX Running BIND, Remote Denial of Service (DoS) | ||
Description: | The query_findclosestnsec3 function in query.c in named in ISC BIND 9.6, 9.7, and 9.8 before 9.8.6-P2 and 9.9 before 9.9.4-P2, and 9.6-ESV before 9.6-ESV-R10-P2, allows remote attackers to cause a denial of service (INSIST assertion failure and daemon exit) via a crafted DNS query to an authoritative nameserver that uses the NSEC3 signing feature. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2014-0591 | Version: | 8 |
Platform(s): | HP-UX 11 | Product(s): | |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:22439 | |||
Oval ID: | oval:org.mitre.oval:def:22439 | ||
Title: | USN-2081-1 -- bind9 vulnerability | ||
Description: | Bind could be made to crash if it received specially crafted network traffic. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-2081-1 CVE-2014-0591 | Version: | 5 |
Platform(s): | Ubuntu 13.10 Ubuntu 13.04 Ubuntu 12.10 Ubuntu 12.04 Ubuntu 10.04 | Product(s): | bind9 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:22902 | |||
Oval ID: | oval:org.mitre.oval:def:22902 | ||
Title: | ELSA-2013:1115: bind97 security update (Important) | ||
Description: | The RFC 5011 implementation in rdata.c in ISC BIND 9.7.x and 9.8.x before 9.8.5-P2, 9.8.6b1, 9.9.x before 9.9.3-P2, and 9.9.4b1, and DNSco BIND 9.9.3-S1 before 9.9.3-S1-P1 and 9.9.4-S1b1, allows remote attackers to cause a denial of service (assertion failure and named daemon exit) via a query with a malformed RDATA section that is not properly handled during construction of a log message, as exploited in the wild in July 2013. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2013:1115-00 CVE-2013-4854 | Version: | 6 |
Platform(s): | Oracle Linux 5 | Product(s): | bind97 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:23024 | |||
Oval ID: | oval:org.mitre.oval:def:23024 | ||
Title: | ELSA-2013:0690: bind97 security update (Important) | ||
Description: | libdns in ISC BIND 9.7.x and 9.8.x before 9.8.4-P2, 9.8.5 before 9.8.5b2, 9.9.x before 9.9.2-P2, and 9.9.3 before 9.9.3b2 on UNIX platforms allows remote attackers to cause a denial of service (memory consumption) via a crafted regular expression, as demonstrated by a memory-exhaustion attack against a machine running a named process. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2013:0690-00 CVE-2013-2266 | Version: | 6 |
Platform(s): | Oracle Linux 5 | Product(s): | bind97 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:23403 | |||
Oval ID: | oval:org.mitre.oval:def:23403 | ||
Title: | ELSA-2012:1364: bind97 security update (Important) | ||
Description: | ISC BIND 9.x before 9.7.6-P4, 9.8.x before 9.8.3-P4, 9.9.x before 9.9.1-P4, and 9.4-ESV and 9.6-ESV before 9.6-ESV-R7-P4 allows remote attackers to cause a denial of service (named daemon hang) via unspecified combinations of resource records. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2012:1364-00 CVE-2012-5166 | Version: | 6 |
Platform(s): | Oracle Linux 5 | Product(s): | bind97 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:23576 | |||
Oval ID: | oval:org.mitre.oval:def:23576 | ||
Title: | ELSA-2013:0550: bind security and enhancement update (Moderate) | ||
Description: | ISC BIND 9.8.x through 9.8.4-P1 and 9.9.x through 9.9.2-P1, in certain configurations involving DNS64 with a Response Policy Zone that lacks an AAAA rewrite rule, allows remote attackers to cause a denial of service (assertion failure and named daemon exit) via a query for an AAAA record. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2013:0550-01 CVE-2012-5689 | Version: | 6 |
Platform(s): | Oracle Linux 6 | Product(s): | bind |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:23678 | |||
Oval ID: | oval:org.mitre.oval:def:23678 | ||
Title: | ELSA-2012:1549: bind security update (Important) | ||
Description: | ISC BIND 9.8.x before 9.8.4-P1 and 9.9.x before 9.9.2-P1, when DNS64 is enabled, allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a crafted query. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2012:1549-01 CVE-2012-5688 | Version: | 6 |
Platform(s): | Oracle Linux 6 | Product(s): | bind |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:23869 | |||
Oval ID: | oval:org.mitre.oval:def:23869 | ||
Title: | ELSA-2013:1114: bind security update (Important) | ||
Description: | The RFC 5011 implementation in rdata.c in ISC BIND 9.7.x and 9.8.x before 9.8.5-P2, 9.8.6b1, 9.9.x before 9.9.3-P2, and 9.9.4b1, and DNSco BIND 9.9.3-S1 before 9.9.3-S1-P1 and 9.9.4-S1b1, allows remote attackers to cause a denial of service (assertion failure and named daemon exit) via a query with a malformed RDATA section that is not properly handled during construction of a log message, as exploited in the wild in July 2013. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2013:1114-00 CVE-2013-4854 | Version: | 6 |
Platform(s): | Oracle Linux 6 | Product(s): | bind |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:24052 | |||
Oval ID: | oval:org.mitre.oval:def:24052 | ||
Title: | ELSA-2013:0689: bind security and bug fix update (Important) | ||
Description: | libdns in ISC BIND 9.7.x and 9.8.x before 9.8.4-P2, 9.8.5 before 9.8.5b2, 9.9.x before 9.9.2-P2, and 9.9.3 before 9.9.3b2 on UNIX platforms allows remote attackers to cause a denial of service (memory consumption) via a crafted regular expression, as demonstrated by a memory-exhaustion attack against a machine running a named process. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2013:0689-01 CVE-2013-2266 | Version: | 6 |
Platform(s): | Oracle Linux 6 | Product(s): | bind |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:24134 | |||
Oval ID: | oval:org.mitre.oval:def:24134 | ||
Title: | ELSA-2014:0043: bind security update (Moderate) | ||
Description: | The query_findclosestnsec3 function in query.c in named in ISC BIND 9.6, 9.7, and 9.8 before 9.8.6-P2 and 9.9 before 9.9.4-P2, and 9.6-ESV before 9.6-ESV-R10-P2, allows remote attackers to cause a denial of service (INSIST assertion failure and daemon exit) via a crafted DNS query to an authoritative nameserver that uses the NSEC3 signing feature. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2014:0043-00 CVE-2014-0591 | Version: | 6 |
Platform(s): | Oracle Linux 6 | Product(s): | bind |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:25076 | |||
Oval ID: | oval:org.mitre.oval:def:25076 | ||
Title: | SUSE-SU-2013:1310-1 -- Security update for bind | ||
Description: | A specially crafted query with malicious rdata could have caused a crash (DoS) in named. Security Issue reference: * CVE-2013-4854 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4854 > | ||
Family: | unix | Class: | patch |
Reference(s): | SUSE-SU-2013:1310-1 CVE-2013-4854 | Version: | 3 |
Platform(s): | SUSE Linux Enterprise Server 11 SUSE Linux Enterprise Desktop 11 | Product(s): | bind |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:25596 | |||
Oval ID: | oval:org.mitre.oval:def:25596 | ||
Title: | SUSE-SU-2014:0179-1 -- Security update for bind | ||
Description: | This update fixes a DoS vulnerability in bind when handling malformed NSEC3-signed zones. CVE-2014-0591 has been assigned to this issue. | ||
Family: | unix | Class: | patch |
Reference(s): | SUSE-SU-2014:0179-1 CVE-2014-0591 | Version: | 3 |
Platform(s): | SUSE Linux Enterprise Server 11 SUSE Linux Enterprise Desktop 11 | Product(s): | bind |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:25966 | |||
Oval ID: | oval:org.mitre.oval:def:25966 | ||
Title: | SUSE-SU-2013:0696-1 -- Security update for dhcp | ||
Description: | The ISC DHCP server had a denial of service issue in handling specific DDNS requests which could cause a out of memory usage situation. (CVE-2013-2266) This update also adds a dhcp6-server service template for SuSEfirewall2 (bnc#783002) Security Issues: * CVE-2013-2266 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2266 > | ||
Family: | unix | Class: | patch |
Reference(s): | SUSE-SU-2013:0696-1 CVE-2013-2266 | Version: | 3 |
Platform(s): | SUSE Linux Enterprise Server 11 SUSE Linux Enterprise Desktop 11 | Product(s): | dhcp |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:26030 | |||
Oval ID: | oval:org.mitre.oval:def:26030 | ||
Title: | RHSA-2014:1244: bind97 security and bug fix update (Moderate) | ||
Description: | The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. It contains a DNS server (named), a resolver library with routines for applications to use when interfacing with DNS, and tools for verifying that the DNS server is operating correctly. These packages contain version 9.7 of the BIND suite. A denial of service flaw was found in the way BIND handled queries for NSEC3-signed zones. A remote attacker could use this flaw against an authoritative name server that served NCES3-signed zones by sending a specially crafted query, which, when processed, would cause named to crash. (CVE-2014-0591) Note: The CVE-2014-0591 issue does not directly affect the version of bind97 shipped in Red Hat Enterprise Linux 5. This issue is being addressed however to assure it is not introduced in future builds of bind97 (possibly built with a different compiler or C library optimization). | ||
Family: | unix | Class: | patch |
Reference(s): | RHSA-2014:1244-00 CVE-2014-0591 CESA-2014:1244 | Version: | 5 |
Platform(s): | Red Hat Enterprise Linux 5 CentOS Linux 5 | Product(s): | bind97 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:26656 | |||
Oval ID: | oval:org.mitre.oval:def:26656 | ||
Title: | DSA-3023-1 bind9 - security update | ||
Description: | Jared Mauch reported a denial of service flaw in the way BIND, a DNS server, handled queries for NSEC3-signed zones. A remote attacker could use this flaw against an authoritative name server that served NCES3-signed zones by sending a specially crafted query, which, when processed, would cause named to crash. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-3023-1 CVE-2014-0591 | Version: | 3 |
Platform(s): | Debian GNU/Linux 7.0 Debian GNU/kFreeBSD 7.0 | Product(s): | bind9 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:26970 | |||
Oval ID: | oval:org.mitre.oval:def:26970 | ||
Title: | ELSA-2014-1244 -- bind97 security and bug fix update (Moderate) | ||
Description: | The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. It contains a DNS server (named), a resolver library with routines for applications to use when interfacing with DNS, and tools for verifying that the DNS server is operating correctly. These packages contain version 9.7 of the BIND suite. A denial of service flaw was found in the way BIND handled queries for NSEC3-signed zones. A remote attacker could use this flaw against an authoritative name server that served NCES3-signed zones by sending a specially crafted query, which, when processed, would cause named to crash. (CVE-2014-0591) Note: The CVE-2014-0591 issue does not directly affect the version of bind97 shipped in Red Hat Enterprise Linux 5. This issue is being addressed however to assure it is not introduced in future builds of bind97 (possibly built with a different compiler or C library optimization). This update also fixes the following bug: * Previously, the bind97 initscript did not check for the existence of the ROOTDIR variable when shutting down the named daemon. As a consequence, some parts of the file system that are mounted when using bind97 in a chroot environment were unmounted on daemon shut down, even if bind97 was not running in a chroot environment. With this update, the initscript has been fixed to check for the existence of the ROOTDIR variable when unmounting some parts of the file system on named daemon shut down. Now, when shutting down bind97 that is not running in a chroot environment, no parts of the file system are unmounted. (BZ#1059118) All bind97 users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. After installing the update, the BIND daemon (named) will be restarted automatically. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2014-1244 CVE-2014-0591 CVE-2013-4854 CVE-2013-2266 | Version: | 5 |
Platform(s): | Oracle Linux 5 | Product(s): | bind97 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:27039 | |||
Oval ID: | oval:org.mitre.oval:def:27039 | ||
Title: | DEPRECATED: ELSA-2013-1115 -- bind97 security update (important) | ||
Description: | [32:9.7.0-17.P2.2] - fix for CVE-2013-4854 | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2013-1115 CVE-2013-4854 | Version: | 4 |
Platform(s): | Oracle Linux 5 | Product(s): | bind97 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:27131 | |||
Oval ID: | oval:org.mitre.oval:def:27131 | ||
Title: | DEPRECATED: ELSA-2014-0043 -- bind security update (moderate) | ||
Description: | [32:9.8.2-0.23.rc1.1] - Fix CVE-2014-0591 [32:9.8.2-0.23.rc1] - Fix gssapictx memory leak (#911167) [32:9.8.2-0.22.rc1] - fix CVE-2013-4854 [32:9.8.2-0.21.rc1] - fix CVE-2013-2266 - ship dns/rrl.h in -devel subpkg [32:9.8.2-0.20.rc1] - remove one bogus file from /usr/share/doc, introduced by RRL patch [32:9.8.2-0.19.rc1] - fix CVE-2012-5689 [32:9.8.2-0.18.rc1] - add response rate limit patch (#873624) | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2014-0043 CVE-2014-0591 | Version: | 5 |
Platform(s): | Oracle Linux 6 | Product(s): | bind |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:27135 | |||
Oval ID: | oval:org.mitre.oval:def:27135 | ||
Title: | DEPRECATED: ELSA-2012-1364 -- bind97 security update (important) | ||
Description: | [32:9.7.0-10.P2.4] - fix CVE-2012-5166 | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2012-1364 CVE-2012-5166 | Version: | 4 |
Platform(s): | Oracle Linux 5 | Product(s): | bind97 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:27480 | |||
Oval ID: | oval:org.mitre.oval:def:27480 | ||
Title: | DEPRECATED: ELSA-2013-0550 -- bind security and enhancement update (moderate) | ||
Description: | A flaw was found in the DNS64 implementation in BIND when using Response Policy Zones (RPZ). If a remote attacker sent a specially-crafted query to a named server that is using RPZ rewrite rules, named could exit unexpectedly with an assertion failure. Note that DNS64 support is not enabled by default. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2013-0550 CVE-2012-5689 | Version: | 4 |
Platform(s): | Oracle Linux 6 | Product(s): | bind |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:27514 | |||
Oval ID: | oval:org.mitre.oval:def:27514 | ||
Title: | DEPRECATED: ELSA-2013-1114 -- bind security update (important) | ||
Description: | [32:9.8.2-0.17.rc1.0.2.el6_4.5] - bump release and build for ULN [32:9.8.2-0.17.rc1.5] - fix CVE-2013-4854 | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2013-1114 CVE-2013-4854 | Version: | 4 |
Platform(s): | Oracle Linux 6 | Product(s): | bind |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:27538 | |||
Oval ID: | oval:org.mitre.oval:def:27538 | ||
Title: | DEPRECATED: ELSA-2013-0690 -- bind97 security update (important) | ||
Description: | [32:9.7.0-17.P2.1] - fix CVE-2013-2266 | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2013-0690 CVE-2013-2266 | Version: | 4 |
Platform(s): | Oracle Linux 5 | Product(s): | bind97 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:27627 | |||
Oval ID: | oval:org.mitre.oval:def:27627 | ||
Title: | DEPRECATED: ELSA-2012-1549 -- bind security update (important) | ||
Description: | [32:9.8.2-0.10.rc1.6] - fix CVE-2012-5688 | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2012-1549 CVE-2012-5688 | Version: | 4 |
Platform(s): | Oracle Linux 6 | Product(s): | bind |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:27642 | |||
Oval ID: | oval:org.mitre.oval:def:27642 | ||
Title: | DEPRECATED: ELSA-2013-0689 -- bind security and bug fix update (important) | ||
Description: | [ 32:9.8.2-0.17.rc1.0.2.el6_4.4] - bump release and build for ULN | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2013-0689 CVE-2013-2266 | Version: | 4 |
Platform(s): | Oracle Linux 6 | Product(s): | bind |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2012-12-31 | Name : Fedora Update for bind FEDORA-2012-19822 File : nvt/gb_fedora_2012_19822_bind_fc16.nasl |
2012-12-14 | Name : Fedora Update for bind FEDORA-2012-19830 File : nvt/gb_fedora_2012_19830_bind_fc17.nasl |
2012-12-13 | Name : SuSE Update for bind openSUSE-SU-2012:1372-1 (bind) File : nvt/gb_suse_2012_1372_1.nasl |
2012-12-10 | Name : Ubuntu Update for bind9 USN-1657-1 File : nvt/gb_ubuntu_USN_1657_1.nasl |
2012-12-10 | Name : CentOS Update for bind CESA-2012:1549 centos6 File : nvt/gb_CESA-2012_1549_bind_centos6.nasl |
2012-12-10 | Name : RedHat Update for bind RHSA-2012:1549-01 File : nvt/gb_RHSA-2012_1549-01_bind.nasl |
2012-12-06 | Name : Mandriva Update for bind MDVSA-2012:177 (bind) File : nvt/gb_mandriva_MDVSA_2012_177.nasl |
2012-10-29 | Name : Debian Security Advisory DSA 2560-1 (bind9) File : nvt/deb_2560_1.nasl |
2012-10-23 | Name : Fedora Update for dnsperf FEDORA-2012-15965 File : nvt/gb_fedora_2012_15965_dnsperf_fc17.nasl |
2012-10-23 | Name : Fedora Update for dnsperf FEDORA-2012-15981 File : nvt/gb_fedora_2012_15981_dnsperf_fc16.nasl |
2012-10-23 | Name : Fedora Update for dhcp FEDORA-2012-15981 File : nvt/gb_fedora_2012_15981_dhcp_fc16.nasl |
2012-10-23 | Name : Fedora Update for bind FEDORA-2012-15981 File : nvt/gb_fedora_2012_15981_bind_fc16.nasl |
2012-10-23 | Name : Fedora Update for bind-dyndb-ldap FEDORA-2012-15981 File : nvt/gb_fedora_2012_15981_bind-dyndb-ldap_fc16.nasl |
2012-10-23 | Name : Fedora Update for dhcp FEDORA-2012-15965 File : nvt/gb_fedora_2012_15965_dhcp_fc17.nasl |
2012-10-23 | Name : Fedora Update for bind FEDORA-2012-15965 File : nvt/gb_fedora_2012_15965_bind_fc17.nasl |
2012-10-23 | Name : Fedora Update for bind-dyndb-ldap FEDORA-2012-15965 File : nvt/gb_fedora_2012_15965_bind-dyndb-ldap_fc17.nasl |
2012-10-16 | Name : RedHat Update for bind97 RHSA-2012:1364-01 File : nvt/gb_RHSA-2012_1364-01_bind97.nasl |
2012-10-16 | Name : RedHat Update for bind RHSA-2012:1363-01 File : nvt/gb_RHSA-2012_1363-01_bind.nasl |
2012-10-16 | Name : CentOS Update for bind97 CESA-2012:1364 centos5 File : nvt/gb_CESA-2012_1364_bind97_centos5.nasl |
2012-10-16 | Name : CentOS Update for bind CESA-2012:1363 centos6 File : nvt/gb_CESA-2012_1363_bind_centos6.nasl |
2012-10-16 | Name : CentOS Update for bind CESA-2012:1363 centos5 File : nvt/gb_CESA-2012_1363_bind_centos5.nasl |
2012-10-13 | Name : FreeBSD Ports: bind99 File : nvt/freebsd_bind992.nasl |
2012-10-11 | Name : Mandriva Update for bind MDVSA-2012:162 (bind) File : nvt/gb_mandriva_MDVSA_2012_162.nasl |
2012-10-11 | Name : Ubuntu Update for bind9 USN-1601-1 File : nvt/gb_ubuntu_USN_1601_1.nasl |
Information Assurance Vulnerability Management (IAVM)
Date | Description |
---|---|
2014-06-19 | IAVM : 2014-A-0086 - Multiple Vulnerabilities in ISC BIND Severity : Category I - VMSKEY : V0052635 |
2013-09-19 | IAVM : 2013-A-0179 - Apple Mac OS X Security Update 2013-004 Severity : Category I - VMSKEY : V0040373 |
2013-08-01 | IAVM : 2013-A-0151 - ISC BIND 9 Remote Denial of Service Vulnerability Severity : Category I - VMSKEY : V0039823 |
Snort® IPS/IDS
Date | Description |
---|---|
2017-12-19 | ISC BIND 9 DNS rdata length handling remote denial of service attempt RuleID : 44879 - Revision : 1 - Type : SERVER-OTHER |
2014-03-27 | ISC libdns client NAPTR record regular expression handling denial of service ... RuleID : 29935 - Revision : 2 - Type : PROTOCOL-DNS |
2014-01-10 | ISC BIND 9 DNS rdata length handling remote denial of service attempt RuleID : 27666 - Revision : 3 - Type : SERVER-OTHER |
2014-01-10 | ISC libdns client NAPTR record regular expression handling denial of service ... RuleID : 26427 - Revision : 4 - Type : PROTOCOL-DNS |
2014-01-10 | ISC BIND NAPTR record regular expression handling denial of service attempt RuleID : 26324 - Revision : 6 - Type : PROTOCOL-DNS |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2018-01-18 | Name : The remote name server is prone to a denial of service attack. File : bind9_993.nasl - Type : ACT_GATHER_INFO |
2017-04-21 | Name : The remote OracleVM host is missing one or more security updates. File : oraclevm_OVMSA-2017-0066.nasl - Type : ACT_GATHER_INFO |
2016-06-22 | Name : The remote OracleVM host is missing one or more security updates. File : oraclevm_OVMSA-2016-0055.nasl - Type : ACT_GATHER_INFO |
2016-01-28 | Name : The remote device is missing a vendor-supplied security patch. File : f5_bigip_SOL14601.nasl - Type : ACT_GATHER_INFO |
2015-07-29 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-2693-1.nasl - Type : ACT_GATHER_INFO |
2015-03-26 | Name : The remote Debian host is missing a security update. File : debian_DLA-48.nasl - Type : ACT_GATHER_INFO |
2015-01-19 | Name : The remote Solaris system is missing a security patch for third-party software. File : solaris11_bind_20130129_2.nasl - Type : ACT_GATHER_INFO |
2014-12-26 | Name : The remote OracleVM host is missing one or more security updates. File : oraclevm_OVMSA-2014-0084.nasl - Type : ACT_GATHER_INFO |
2014-11-08 | Name : The remote Red Hat host is missing a security update. File : redhat-RHSA-2013-0746.nasl - Type : ACT_GATHER_INFO |
2014-11-08 | Name : The remote Red Hat host is missing a security update. File : redhat-RHSA-2013-1181.nasl - Type : ACT_GATHER_INFO |
2014-10-21 | Name : The remote host is missing a security update for OS X Server. File : macosx_server_4_0.nasl - Type : ACT_GATHER_INFO |
2014-10-14 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20140916_bind97_on_SL5_x.nasl - Type : ACT_GATHER_INFO |
2014-10-10 | Name : The remote device is missing a vendor-supplied security patch. File : f5_bigip_SOL14201.nasl - Type : ACT_GATHER_INFO |
2014-10-10 | Name : The remote device is missing a vendor-supplied security patch. File : f5_bigip_SOL14386.nasl - Type : ACT_GATHER_INFO |
2014-10-10 | Name : The remote device is missing a vendor-supplied security patch. File : f5_bigip_SOL14613.nasl - Type : ACT_GATHER_INFO |
2014-10-01 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2014-1244.nasl - Type : ACT_GATHER_INFO |
2014-09-18 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2014-1244.nasl - Type : ACT_GATHER_INFO |
2014-09-16 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2014-1244.nasl - Type : ACT_GATHER_INFO |
2014-09-12 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-3023.nasl - Type : ACT_GATHER_INFO |
2014-06-25 | Name : The remote Slackware host is missing a security update. File : Slackware_SSA_2014-175-01.nasl - Type : ACT_GATHER_INFO |
2014-06-18 | Name : The remote host is affected by a denial of service vulnerability. File : mcafee_firewall_enterprise_SB10052.nasl - Type : ACT_GATHER_INFO |
2014-06-18 | Name : The remote host is affected by a denial of service vulnerability. File : mcafee_web_gateway_SB10052.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2012-716.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2012-853.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2013-296.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2013-297.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2013-302.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2013-303.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2013-654.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2014-110.nasl - Type : ACT_GATHER_INFO |
2014-02-05 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2014-287.nasl - Type : ACT_GATHER_INFO |
2014-02-01 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_bind-140127.nasl - Type : ACT_GATHER_INFO |
2014-01-30 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201401-34.nasl - Type : ACT_GATHER_INFO |
2014-01-29 | Name : The remote Slackware host is missing a security update. File : Slackware_SSA_2014-028-01.nasl - Type : ACT_GATHER_INFO |
2014-01-22 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20140120_bind_on_SL6_x.nasl - Type : ACT_GATHER_INFO |
2014-01-21 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2014-0043.nasl - Type : ACT_GATHER_INFO |
2014-01-21 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2014-0043.nasl - Type : ACT_GATHER_INFO |
2014-01-21 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2014-0043.nasl - Type : ACT_GATHER_INFO |
2014-01-20 | Name : The remote Fedora host is missing a security update. File : fedora_2014-0811.nasl - Type : ACT_GATHER_INFO |
2014-01-20 | Name : The remote Fedora host is missing a security update. File : fedora_2014-0858.nasl - Type : ACT_GATHER_INFO |
2014-01-20 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2014-002.nasl - Type : ACT_GATHER_INFO |
2014-01-14 | Name : The remote name server may be affected by a denial of service vulnerability. File : bind9_994_p2.nasl - Type : ACT_GATHER_INFO |
2014-01-14 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_cb252f017c4311e3b0a6005056a37f68.nasl - Type : ACT_GATHER_INFO |
2014-01-14 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-2081-1.nasl - Type : ACT_GATHER_INFO |
2013-12-03 | Name : The remote AIX host is missing a vendor-supplied security patch. File : aix_U855334.nasl - Type : ACT_GATHER_INFO |
2013-10-01 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2013-214.nasl - Type : ACT_GATHER_INFO |
2013-09-13 | Name : The remote host is missing a Mac OS X update that fixes several security issues. File : macosx_10_8_5.nasl - Type : ACT_GATHER_INFO |
2013-09-13 | Name : The remote host is missing a Mac OS X update that fixes several security issues. File : macosx_SecUpd2013-004.nasl - Type : ACT_GATHER_INFO |
2013-09-04 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2012-138.nasl - Type : ACT_GATHER_INFO |
2013-09-04 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2012-146.nasl - Type : ACT_GATHER_INFO |
2013-09-04 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2013-158.nasl - Type : ACT_GATHER_INFO |
2013-09-04 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2013-176.nasl - Type : ACT_GATHER_INFO |
2013-08-08 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_bind-130805.nasl - Type : ACT_GATHER_INFO |
2013-08-07 | Name : The remote Slackware host is missing a security update. File : Slackware_SSA_2013-218-01.nasl - Type : ACT_GATHER_INFO |
2013-08-05 | Name : The remote Fedora host is missing a security update. File : fedora_2013-13831.nasl - Type : ACT_GATHER_INFO |
2013-08-05 | Name : The remote Fedora host is missing a security update. File : fedora_2013-13863.nasl - Type : ACT_GATHER_INFO |
2013-07-31 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2013-1114.nasl - Type : ACT_GATHER_INFO |
2013-07-31 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2013-1115.nasl - Type : ACT_GATHER_INFO |
2013-07-31 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2013-1114.nasl - Type : ACT_GATHER_INFO |
2013-07-31 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2013-1115.nasl - Type : ACT_GATHER_INFO |
2013-07-31 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20130730_bind97_on_SL5_x.nasl - Type : ACT_GATHER_INFO |
2013-07-31 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20130730_bind_on_SL6_x.nasl - Type : ACT_GATHER_INFO |
2013-07-30 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-1114.nasl - Type : ACT_GATHER_INFO |
2013-07-30 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-1115.nasl - Type : ACT_GATHER_INFO |
2013-07-30 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1910-1.nasl - Type : ACT_GATHER_INFO |
2013-07-29 | Name : The remote name server is prone to a denial of service attack. File : bind9_993_p2.nasl - Type : ACT_GATHER_INFO |
2013-07-29 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2728.nasl - Type : ACT_GATHER_INFO |
2013-07-29 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2013-202.nasl - Type : ACT_GATHER_INFO |
2013-07-28 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_7943e521f64811e286073c970e169bc2.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Fedora host is missing a security update. File : fedora_2013-9984.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2012-1363.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2012-1364.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2012-1365.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2012-1549.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2013-0550.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2013-0689.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2013-0690.nasl - Type : ACT_GATHER_INFO |
2013-06-29 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2013-0689.nasl - Type : ACT_GATHER_INFO |
2013-06-07 | Name : The remote name server is prone to a denial of service attack. File : bind9_993_p1.nasl - Type : ACT_GATHER_INFO |
2013-06-07 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_72f35727ce8311e2be04005056a37f68.nasl - Type : ACT_GATHER_INFO |
2013-05-01 | Name : The remote AIX host is missing a vendor-supplied security patch. File : aix_U855824.nasl - Type : ACT_GATHER_INFO |
2013-05-01 | Name : The remote AIX host is missing a vendor-supplied security patch. File : aix_U857842.nasl - Type : ACT_GATHER_INFO |
2013-04-20 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2013-058.nasl - Type : ACT_GATHER_INFO |
2013-04-20 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2013-059.nasl - Type : ACT_GATHER_INFO |
2013-04-18 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_dhcp-130327.nasl - Type : ACT_GATHER_INFO |
2013-04-14 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_4b79538ba45011e29898001060e06fd4.nasl - Type : ACT_GATHER_INFO |
2013-04-08 | Name : The remote Fedora host is missing a security update. File : fedora_2013-4533.nasl - Type : ACT_GATHER_INFO |
2013-04-08 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_13031d989bd111e2a7be8c705af55518.nasl - Type : ACT_GATHER_INFO |
2013-04-08 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_7a282e4995b611e284330800273fe665.nasl - Type : ACT_GATHER_INFO |
2013-04-07 | Name : The remote Fedora host is missing a security update. File : fedora_2013-4525.nasl - Type : ACT_GATHER_INFO |
2013-04-01 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2656.nasl - Type : ACT_GATHER_INFO |
2013-04-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20130328_bind97_on_SL5_x.nasl - Type : ACT_GATHER_INFO |
2013-04-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20130328_bind_on_SL6_x.nasl - Type : ACT_GATHER_INFO |
2013-04-01 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1783-1.nasl - Type : ACT_GATHER_INFO |
2013-03-29 | Name : The remote name server is prone to a denial of service attack. File : bind9_992_p2.nasl - Type : ACT_GATHER_INFO |
2013-03-29 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2013-0690.nasl - Type : ACT_GATHER_INFO |
2013-03-29 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-0689.nasl - Type : ACT_GATHER_INFO |
2013-03-29 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-0690.nasl - Type : ACT_GATHER_INFO |
2013-03-28 | Name : The remote Slackware host is missing a security update. File : Slackware_SSA_2013-086-01.nasl - Type : ACT_GATHER_INFO |
2013-03-28 | Name : The remote Slackware host is missing a security update. File : Slackware_SSA_2013-086-02.nasl - Type : ACT_GATHER_INFO |
2013-03-28 | Name : The remote AIX host is missing a vendor-supplied security patch. File : aix_U854646.nasl - Type : ACT_GATHER_INFO |
2013-03-28 | Name : The remote AIX host is missing a vendor-supplied security patch. File : aix_U854732.nasl - Type : ACT_GATHER_INFO |
2013-03-10 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2013-0550.nasl - Type : ACT_GATHER_INFO |
2013-03-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20130221_bind_on_SL6_x.nasl - Type : ACT_GATHER_INFO |
2013-02-22 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_4671cdc97c6d11e2809b6c626d99876c.nasl - Type : ACT_GATHER_INFO |
2013-02-22 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-0550.nasl - Type : ACT_GATHER_INFO |
2013-01-25 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_bind-121015.nasl - Type : ACT_GATHER_INFO |
2013-01-24 | Name : The remote AIX host is missing a security patch. File : aix_IV30364.nasl - Type : ACT_GATHER_INFO |
2013-01-24 | Name : The remote AIX host is missing a security patch. File : aix_IV30365.nasl - Type : ACT_GATHER_INFO |
2013-01-24 | Name : The remote AIX host is missing a security patch. File : aix_IV30366.nasl - Type : ACT_GATHER_INFO |
2013-01-24 | Name : The remote AIX host is missing a security patch. File : aix_IV30367.nasl - Type : ACT_GATHER_INFO |
2013-01-24 | Name : The remote AIX host is missing a security patch. File : aix_IV30368.nasl - Type : ACT_GATHER_INFO |
2012-12-31 | Name : The remote Fedora host is missing a security update. File : fedora_2012-19822.nasl - Type : ACT_GATHER_INFO |
2012-12-13 | Name : The remote Fedora host is missing a security update. File : fedora_2012-19830.nasl - Type : ACT_GATHER_INFO |
2012-12-11 | Name : The remote Fedora host is missing a security update. File : fedora_2012-19777.nasl - Type : ACT_GATHER_INFO |
2012-12-09 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2012-1549.nasl - Type : ACT_GATHER_INFO |
2012-12-09 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20121206_bind_on_SL6_x.nasl - Type : ACT_GATHER_INFO |
2012-12-07 | Name : The remote Slackware host is missing a security update. File : Slackware_SSA_2012-341-01.nasl - Type : ACT_GATHER_INFO |
2012-12-07 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2012-1549.nasl - Type : ACT_GATHER_INFO |
2012-12-07 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1657-1.nasl - Type : ACT_GATHER_INFO |
2012-12-06 | Name : The remote name server is prone to a denial of service attack. File : bind9_992_p1.nasl - Type : ACT_GATHER_INFO |
2012-12-06 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_2892a8e23d6811e28e010800273fe665.nasl - Type : ACT_GATHER_INFO |
2012-12-06 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2012-177.nasl - Type : ACT_GATHER_INFO |
2012-10-23 | Name : The remote Fedora host is missing one or more security updates. File : fedora_2012-15981.nasl - Type : ACT_GATHER_INFO |
2012-10-22 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2560.nasl - Type : ACT_GATHER_INFO |
2012-10-22 | Name : The remote Fedora host is missing one or more security updates. File : fedora_2012-15965.nasl - Type : ACT_GATHER_INFO |
2012-10-22 | Name : The remote Fedora host is missing one or more security updates. File : fedora_2012-16022.nasl - Type : ACT_GATHER_INFO |
2012-10-16 | Name : The remote name server may be affected by a denial of service vulnerability. File : bind9_991_p4.nasl - Type : ACT_GATHER_INFO |
2012-10-16 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20121012_bind97_on_SL5_x.nasl - Type : ACT_GATHER_INFO |
2012-10-16 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20121012_bind_on_SL5_x.nasl - Type : ACT_GATHER_INFO |
2012-10-15 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2012-1363.nasl - Type : ACT_GATHER_INFO |
2012-10-15 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2012-1364.nasl - Type : ACT_GATHER_INFO |
2012-10-15 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2012-1363.nasl - Type : ACT_GATHER_INFO |
2012-10-15 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2012-1364.nasl - Type : ACT_GATHER_INFO |
2012-10-11 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_57a700f912c011e29f86001d923933b6.nasl - Type : ACT_GATHER_INFO |
2012-10-11 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2012-162.nasl - Type : ACT_GATHER_INFO |
2012-10-11 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1601-1.nasl - Type : ACT_GATHER_INFO |
2007-06-18 | Name : The remote host is missing Sun Security Patch number 119783-40 File : solaris10_119783.nasl - Type : ACT_GATHER_INFO |
2007-06-18 | Name : The remote host is missing Sun Security Patch number 119784-40 File : solaris10_x86_119784.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:38:07 |
|
2014-01-30 00:18:15 |
|