Executive Summary
Summary | |
---|---|
Title | bind security update |
Informations | |||
---|---|---|---|
Name | RHSA-2010:0062 | First vendor Publication | 2010-01-20 |
Vendor | RedHat | Last vendor Modification | 2010-01-20 |
Severity (Vendor) | Moderate | Revision | 02 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:N/I:P/A:N) | |||
---|---|---|---|
Cvss Base Score | 4.3 | Attack Range | Network |
Cvss Impact Score | 2.9 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Problem Description: Updated bind packages that fix two security issues are now available for Red Hat Enterprise Linux 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: RHEL Desktop Workstation (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 3. Description: The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. A flaw was found in the BIND DNSSEC NSEC/NSEC3 validation code. If BIND was running as a DNSSEC-validating resolver, it could incorrectly cache NXDOMAIN responses, as if they were valid, for records proven by NSEC or NSEC3 to exist. A remote attacker could use this flaw to cause a BIND server to return the bogus, cached NXDOMAIN responses for valid records and prevent users from retrieving those records (denial of service). (CVE-2010-0097) The original fix for CVE-2009-4022 was found to be incomplete. BIND was incorrectly caching certain responses without performing proper DNSSEC validation. CNAME and DNAME records could be cached, without proper DNSSEC validation, when received from processing recursive client queries that requested DNSSEC records but indicated that checking should be disabled. A remote attacker could use this flaw to bypass the DNSSEC validation check and perform a cache poisoning attack if the target BIND server was receiving such client queries. (CVE-2010-0290) All BIND users are advised to upgrade to these updated packages, which contain a backported patch to resolve these issues. After installing the update, the BIND daemon (named) will be restarted automatically. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 554851 - CVE-2010-0097 BIND DNSSEC NSEC/NSEC3 validation code could cause bogus NXDOMAIN responses 557121 - CVE-2010-0290 BIND upstream fix for CVE-2009-4022 is incomplete |
Original Source
Url : https://rhn.redhat.com/errata/RHSA-2010-0062.html |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-20 | Improper Input Validation |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:10821 | |||
Oval ID: | oval:org.mitre.oval:def:10821 | ||
Title: | Unspecified vulnerability in ISC BIND 9.0.x through 9.3.x, 9.4 before 9.4.3-P4, 9.5 before 9.5.2-P1, 9.6 before 9.6.1-P2, and 9.7 beta before 9.7.0b3, with DNSSEC validation enabled and checking disabled (CD), allows remote attackers to conduct DNS cache poisoning attacks by receiving a recursive client query and sending a response that contains an Additional section with crafted data, which is not properly handled when the response is processed "at the same time as requesting DNSSEC records (DO)," aka Bug 20438. | ||
Description: | Unspecified vulnerability in ISC BIND 9.0.x through 9.3.x, 9.4 before 9.4.3-P4, 9.5 before 9.5.2-P1, 9.6 before 9.6.1-P2, and 9.7 beta before 9.7.0b3, with DNSSEC validation enabled and checking disabled (CD), allows remote attackers to conduct DNS cache poisoning attacks by receiving a recursive client query and sending a response that contains an Additional section with crafted data, which is not properly handled when the response is processed "at the same time as requesting DNSSEC records (DO)," aka Bug 20438. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2009-4022 | Version: | 5 |
Platform(s): | Red Hat Enterprise Linux 5 CentOS Linux 5 Oracle Linux 5 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:11745 | |||
Oval ID: | oval:org.mitre.oval:def:11745 | ||
Title: | Vulnerability with DNSSEC validation enabled in BIND. | ||
Description: | Unspecified vulnerability in ISC BIND 9.0.x through 9.3.x, 9.4 before 9.4.3-P4, 9.5 before 9.5.2-P1, 9.6 before 9.6.1-P2, and 9.7 beta before 9.7.0b3, with DNSSEC validation enabled and checking disabled (CD), allows remote attackers to conduct DNS cache poisoning attacks by receiving a recursive client query and sending a response that contains an Additional section with crafted data, which is not properly handled when the response is processed "at the same time as requesting DNSSEC records (DO)," aka Bug 20438. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2009-4022 | Version: | 3 |
Platform(s): | IBM AIX 6.1 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:12205 | |||
Oval ID: | oval:org.mitre.oval:def:12205 | ||
Title: | HP-UX Running BIND, Remote Compromise of NXDOMAIN Responses. | ||
Description: | ISC BIND 9.0.x through 9.3.x, 9.4 before 9.4.3-P5, 9.5 before 9.5.2-P2, 9.6 before 9.6.1-P3, and 9.7.0 beta does not properly validate DNSSEC (1) NSEC and (2) NSEC3 records, which allows remote attackers to add the Authenticated Data (AD) flag to a forged NXDOMAIN response for an existing domain. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2010-0097 | Version: | 11 |
Platform(s): | HP-UX 11 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:20476 | |||
Oval ID: | oval:org.mitre.oval:def:20476 | ||
Title: | Multiple vulnerabilities in AIX BIND | ||
Description: | ISC BIND 9.0.x through 9.3.x, 9.4 before 9.4.3-P5, 9.5 before 9.5.2-P2, 9.6 before 9.6.1-P3, and 9.7.0 beta does not properly validate DNSSEC (1) NSEC and (2) NSEC3 records, which allows remote attackers to add the Authenticated Data (AD) flag to a forged NXDOMAIN response for an existing domain. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2010-0097 | Version: | 6 |
Platform(s): | IBM AIX 6.1 IBM AIX 7.1 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:22841 | |||
Oval ID: | oval:org.mitre.oval:def:22841 | ||
Title: | ELSA-2009:1620: bind security update (Moderate) | ||
Description: | Unspecified vulnerability in ISC BIND 9.0.x through 9.3.x, 9.4 before 9.4.3-P4, 9.5 before 9.5.2-P1, 9.6 before 9.6.1-P2, and 9.7 beta before 9.7.0b3, with DNSSEC validation enabled and checking disabled (CD), allows remote attackers to conduct DNS cache poisoning attacks by receiving a recursive client query and sending a response that contains an Additional section with crafted data, which is not properly handled when the response is processed "at the same time as requesting DNSSEC records (DO)," aka Bug 20438. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2009:1620-01 CVE-2009-4022 | Version: | 6 |
Platform(s): | Oracle Linux 5 | Product(s): | bind |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:29109 | |||
Oval ID: | oval:org.mitre.oval:def:29109 | ||
Title: | RHSA-2009:1620 -- bind security update (Moderate) | ||
Description: | Updated bind packages that fix one security issue are now available for Red Hat Enterprise Linux 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. | ||
Family: | unix | Class: | patch |
Reference(s): | RHSA-2009:1620 CESA-2009:1620-CentOS 5 CVE-2009-4022 | Version: | 3 |
Platform(s): | Red Hat Enterprise Linux 5 CentOS Linux 5 | Product(s): | bind |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:6815 | |||
Oval ID: | oval:org.mitre.oval:def:6815 | ||
Title: | HP-UX Running BIND, Remote Denial of Service (DoS), Unauthorized Disclosure of Information | ||
Description: | Unspecified vulnerability in ISC BIND 9.0.x through 9.3.x, 9.4 before 9.4.3-P5, 9.5 before 9.5.2-P2, 9.6 before 9.6.1-P3, and 9.7.0 beta, with DNSSEC validation enabled and checking disabled (CD), allows remote attackers to conduct DNS cache poisoning attacks by receiving a recursive client query and sending a response that contains (1) CNAME or (2) DNAME records, which do not have the intended validation before caching, aka Bug 20737. NOTE: this vulnerability exists because of an incomplete fix for CVE-2009-4022. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2010-0290 | Version: | 6 |
Platform(s): | HP-UX 11 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:7212 | |||
Oval ID: | oval:org.mitre.oval:def:7212 | ||
Title: | ISC BIND 9 DNSSEC Bogus NXDOMAIN Response Remote Cache Poisoning Vulnerability | ||
Description: | ISC BIND 9.0.x through 9.3.x, 9.4 before 9.4.3-P5, 9.5 before 9.5.2-P2, 9.6 before 9.6.1-P3, and 9.7.0 beta does not properly validate DNSSEC (1) NSEC and (2) NSEC3 records, which allows remote attackers to add the Authenticated Data (AD) flag to a forged NXDOMAIN response for an existing domain. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2010-0097 | Version: | 5 |
Platform(s): | VMWare ESX Server 4.0 | Product(s): | |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:7261 | |||
Oval ID: | oval:org.mitre.oval:def:7261 | ||
Title: | HP-UX Running BIND, Remote Denial of Service (DoS), Unauthorized Disclosure of Information | ||
Description: | Unspecified vulnerability in ISC BIND 9.0.x through 9.3.x, 9.4 before 9.4.3-P4, 9.5 before 9.5.2-P1, 9.6 before 9.6.1-P2, and 9.7 beta before 9.7.0b3, with DNSSEC validation enabled and checking disabled (CD), allows remote attackers to conduct DNS cache poisoning attacks by receiving a recursive client query and sending a response that contains an Additional section with crafted data, which is not properly handled when the response is processed "at the same time as requesting DNSSEC records (DO)," aka Bug 20438. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2009-4022 | Version: | 6 |
Platform(s): | HP-UX 11 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:7430 | |||
Oval ID: | oval:org.mitre.oval:def:7430 | ||
Title: | A vulnerability in the way named(1M) handles recursive client queries may allow a remote unprivileged user to cause named(1M) to return NXDOMAIN (Non-Existent Domain) for Internet hosts thus causing a Denial of Service (DoS) for those hosts to end users | ||
Description: | ISC BIND 9.0.x through 9.3.x, 9.4 before 9.4.3-P5, 9.5 before 9.5.2-P2, 9.6 before 9.6.1-P3, and 9.7.0 beta does not properly validate DNSSEC (1) NSEC and (2) NSEC3 records, which allows remote attackers to add the Authenticated Data (AD) flag to a forged NXDOMAIN response for an existing domain. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2010-0097 | Version: | 3 |
Platform(s): | Sun Solaris 9 Sun Solaris 10 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:7459 | |||
Oval ID: | oval:org.mitre.oval:def:7459 | ||
Title: | Security Vulnerability in BIND DNS Software Shipped With Solaris May Allow DNS Cache Poisoning | ||
Description: | Unspecified vulnerability in ISC BIND 9.0.x through 9.3.x, 9.4 before 9.4.3-P4, 9.5 before 9.5.2-P1, 9.6 before 9.6.1-P2, and 9.7 beta before 9.7.0b3, with DNSSEC validation enabled and checking disabled (CD), allows remote attackers to conduct DNS cache poisoning attacks by receiving a recursive client query and sending a response that contains an Additional section with crafted data, which is not properly handled when the response is processed "at the same time as requesting DNSSEC records (DO)," aka Bug 20438. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2009-4022 | Version: | 3 |
Platform(s): | Sun Solaris 9 Sun Solaris 10 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:7512 | |||
Oval ID: | oval:org.mitre.oval:def:7512 | ||
Title: | ISC BIND 9 DNSSEC Query Response Additional Section Remote Cache Poisoning Vulnerability | ||
Description: | Unspecified vulnerability in ISC BIND 9.0.x through 9.3.x, 9.4 before 9.4.3-P5, 9.5 before 9.5.2-P2, 9.6 before 9.6.1-P3, and 9.7.0 beta, with DNSSEC validation enabled and checking disabled (CD), allows remote attackers to conduct DNS cache poisoning attacks by receiving a recursive client query and sending a response that contains (1) CNAME or (2) DNAME records, which do not have the intended validation before caching, aka Bug 20737. NOTE: this vulnerability exists because of an incomplete fix for CVE-2009-4022. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2010-0290 | Version: | 5 |
Platform(s): | VMWare ESX Server 4.0 | Product(s): | |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:8884 | |||
Oval ID: | oval:org.mitre.oval:def:8884 | ||
Title: | Unspecified vulnerability in ISC BIND 9.0.x through 9.3.x, 9.4 before 9.4.3-P5, 9.5 before 9.5.2-P2, 9.6 before 9.6.1-P3, and 9.7.0 beta, with DNSSEC validation enabled and checking disabled (CD), allows remote attackers to conduct DNS cache poisoning attacks by receiving a recursive client query and sending a response that contains (1) CNAME or (2) DNAME records, which do not have the intended validation before caching, aka Bug 20737. NOTE: this vulnerability exists because of an incomplete fix for CVE-2009-4022. | ||
Description: | Unspecified vulnerability in ISC BIND 9.0.x through 9.3.x, 9.4 before 9.4.3-P5, 9.5 before 9.5.2-P2, 9.6 before 9.6.1-P3, and 9.7.0 beta, with DNSSEC validation enabled and checking disabled (CD), allows remote attackers to conduct DNS cache poisoning attacks by receiving a recursive client query and sending a response that contains (1) CNAME or (2) DNAME records, which do not have the intended validation before caching, aka Bug 20737. NOTE: this vulnerability exists because of an incomplete fix for CVE-2009-4022. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2010-0290 | Version: | 5 |
Platform(s): | Red Hat Enterprise Linux 5 CentOS Linux 5 Oracle Linux 5 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:9357 | |||
Oval ID: | oval:org.mitre.oval:def:9357 | ||
Title: | ISC BIND 9.0.x through 9.3.x, 9.4 before 9.4.3-P5, 9.5 before 9.5.2-P2, 9.6 before 9.6.1-P3, and 9.7.0 beta does not properly validate DNSSEC (1) NSEC and (2) NSEC3 records, which allows remote attackers to add the Authenticated Data (AD) flag to a forged NXDOMAIN response for an existing domain. | ||
Description: | ISC BIND 9.0.x through 9.3.x, 9.4 before 9.4.3-P5, 9.5 before 9.5.2-P2, 9.6 before 9.6.1-P3, and 9.7.0 beta does not properly validate DNSSEC (1) NSEC and (2) NSEC3 records, which allows remote attackers to add the Authenticated Data (AD) flag to a forged NXDOMAIN response for an existing domain. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2010-0097 | Version: | 5 |
Platform(s): | Red Hat Enterprise Linux 5 CentOS Linux 5 Oracle Linux 5 | Product(s): | |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2012-04-16 | Name : VMSA-2010-0009: ESXi utilities and ESX Service Console third party updates File : nvt/gb_VMSA-2010-0009.nasl |
2011-10-20 | Name : Mac OS X v10.6.8 Multiple Vulnerabilities (2011-006) File : nvt/gb_macosx_su11-006.nasl |
2011-08-09 | Name : CentOS Update for bind CESA-2010:0062 centos5 i386 File : nvt/gb_CESA-2010_0062_bind_centos5_i386.nasl |
2011-08-09 | Name : CentOS Update for bind CESA-2009:1620 centos5 i386 File : nvt/gb_CESA-2009_1620_bind_centos5_i386.nasl |
2011-03-09 | Name : Gentoo Security Advisory GLSA 201006-11 (BIND) File : nvt/glsa_201006_11.nasl |
2010-10-01 | Name : HP-UX Update for BIND HPSBUX02546 File : nvt/gb_hp_ux_HPSBUX02546.nasl |
2010-07-06 | Name : Debian Security Advisory DSA 2054-2 (bind9) File : nvt/deb_2054_2.nasl |
2010-06-10 | Name : Debian Security Advisory DSA 2054-1 (bind9) File : nvt/deb_2054_1.nasl |
2010-04-30 | Name : HP-UX Update for BIND HPSBUX02519 File : nvt/gb_hp_ux_HPSBUX02519.nasl |
2010-03-02 | Name : Fedora Update for bind FEDORA-2010-0868 File : nvt/gb_fedora_2010_0868_bind_fc12.nasl |
2010-03-02 | Name : Fedora Update for bind FEDORA-2010-0861 File : nvt/gb_fedora_2010_0861_bind_fc11.nasl |
2010-01-29 | Name : SuSE Update for acroread SUSE-SA:2010:008 File : nvt/gb_suse_2010_008.nasl |
2010-01-25 | Name : RedHat Update for bind RHSA-2010:0062-02 File : nvt/gb_RHSA-2010_0062-02_bind.nasl |
2010-01-22 | Name : Ubuntu Update for bind9 vulnerabilities USN-888-1 File : nvt/gb_ubuntu_USN_888_1.nasl |
2010-01-22 | Name : Mandriva Update for bind MDVSA-2010:021 (bind) File : nvt/gb_mandriva_MDVSA_2010_021.nasl |
2010-01-20 | Name : ISC BIND 9 DNSSEC Bogus NXDOMAIN Response Remote Cache Poisoning Vulnerability File : nvt/bind_37865.nasl |
2010-01-11 | Name : FreeBSD Security Advisory (FreeBSD-SA-10:01.bind.asc) File : nvt/freebsdsa_bind8.nasl |
2009-12-30 | Name : CentOS Security Advisory CESA-2009:1620 (bind) File : nvt/ovcesa2009_1620.nasl |
2009-12-30 | Name : Debian Security Advisory DSA 1961-1 (bind9) File : nvt/deb_1961_1.nasl |
2009-12-10 | Name : Mandriva Security Advisory MDVSA-2009:313-1 (bind) File : nvt/mdksa_2009_313_1.nasl |
2009-12-10 | Name : SuSE Security Advisory SUSE-SA:2009:059 (bind) File : nvt/suse_sa_2009_059.nasl |
2009-12-10 | Name : Ubuntu USN-865-1 (bind9) File : nvt/ubuntu_865_1.nasl |
2009-12-03 | Name : Fedora Core 12 FEDORA-2009-12233 (bind) File : nvt/fcore_2009_12233.nasl |
2009-12-03 | Name : Fedora Core 11 FEDORA-2009-12218 (bind) File : nvt/fcore_2009_12218.nasl |
2009-12-03 | Name : SLES11: Security update for bind File : nvt/sles11_bind0.nasl |
2009-12-03 | Name : RedHat Security Advisory RHSA-2009:1620 File : nvt/RHSA_2009_1620.nasl |
2009-11-25 | Name : ISC BIND 9 DNSSEC Query Response Additional Section Remote Cache Poisoning Vu... File : nvt/bind_37118.nasl |
0000-00-00 | Name : Slackware Advisory SSA:2010-176-01 bind File : nvt/esoft_slk_ssa_2010_176_01.nasl |
0000-00-00 | Name : Slackware Advisory SSA:2009-336-01 bind File : nvt/esoft_slk_ssa_2009_336_01.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
62007 | ISC BIND Recursive Client Query CNAME / DNAME Response DNS Cache Poisoning |
61853 | ISC BIND DNSSEC Validation Crafted NXDOMAIN Request Cache Poisoning |
60493 | ISC BIND DNSSEC Recursive Query Additional Section Cache Poisoning |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2017-04-21 | Name : The remote OracleVM host is missing one or more security updates. File : oraclevm_OVMSA-2017-0066.nasl - Type : ACT_GATHER_INFO |
2016-03-08 | Name : The remote VMware ESX / ESXi host is missing a security-related patch. File : vmware_VMSA-2010-0009_remote.nasl - Type : ACT_GATHER_INFO |
2016-03-08 | Name : The remote VMware ESX host is missing a security-related patch. File : vmware_VMSA-2010-0004_remote.nasl - Type : ACT_GATHER_INFO |
2015-07-31 | Name : The remote device is missing a vendor-supplied security patch. File : f5_bigip_SOL17025.nasl - Type : ACT_GATHER_INFO |
2014-11-04 | Name : The remote device is missing a vendor-supplied security patch. File : f5_bigip_SOL15787.nasl - Type : ACT_GATHER_INFO |
2014-10-28 | Name : The remote device is missing a vendor-supplied security patch. File : f5_bigip_SOL15748.nasl - Type : ACT_GATHER_INFO |
2014-10-10 | Name : The remote device is missing a vendor-supplied security patch. File : f5_bigip_SOL10898.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2009-1620.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2010-0062.nasl - Type : ACT_GATHER_INFO |
2013-01-24 | Name : The remote AIX host is missing a security patch. File : aix_IV09491.nasl - Type : ACT_GATHER_INFO |
2013-01-24 | Name : The remote AIX host is missing a security patch. File : aix_IV09978.nasl - Type : ACT_GATHER_INFO |
2013-01-24 | Name : The remote AIX host is missing a security patch. File : aix_IV10049.nasl - Type : ACT_GATHER_INFO |
2013-01-24 | Name : The remote AIX host is missing a security patch. File : aix_IV11742.nasl - Type : ACT_GATHER_INFO |
2013-01-24 | Name : The remote AIX host is missing a security patch. File : aix_IV11743.nasl - Type : ACT_GATHER_INFO |
2013-01-24 | Name : The remote AIX host is missing a security patch. File : aix_IV11744.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20100120_bind_on_SL5_x.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20091130_bind_on_SL5_x.nasl - Type : ACT_GATHER_INFO |
2011-10-13 | Name : The remote host is missing a Mac OS X update that fixes several security issues. File : macosx_SecUpd2011-006.nasl - Type : ACT_GATHER_INFO |
2011-05-28 | Name : The remote Slackware host is missing a security update. File : Slackware_SSA_2010-176-01.nasl - Type : ACT_GATHER_INFO |
2011-05-28 | Name : The remote Slackware host is missing a security update. File : Slackware_SSA_2009-336-01.nasl - Type : ACT_GATHER_INFO |
2010-07-01 | Name : The remote Fedora host is missing a security update. File : fedora_2010-0868.nasl - Type : ACT_GATHER_INFO |
2010-07-01 | Name : The remote Fedora host is missing a security update. File : fedora_2010-0861.nasl - Type : ACT_GATHER_INFO |
2010-06-08 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2054.nasl - Type : ACT_GATHER_INFO |
2010-06-07 | Name : The remote HP-UX host is missing a security-related patch. File : hpux_PHNE_40339.nasl - Type : ACT_GATHER_INFO |
2010-06-02 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201006-11.nasl - Type : ACT_GATHER_INFO |
2010-06-01 | Name : The remote VMware ESXi / ESX host is missing one or more security-related pat... File : vmware_VMSA-2010-0009.nasl - Type : ACT_GATHER_INFO |
2010-03-05 | Name : The remote VMware ESX host is missing one or more security-related patches. File : vmware_VMSA-2010-0004.nasl - Type : ACT_GATHER_INFO |
2010-02-24 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-1961.nasl - Type : ACT_GATHER_INFO |
2010-01-26 | Name : The remote openSUSE host is missing a security update. File : suse_11_0_bind-100121.nasl - Type : ACT_GATHER_INFO |
2010-01-26 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_bind-100121.nasl - Type : ACT_GATHER_INFO |
2010-01-26 | Name : The remote openSUSE host is missing a security update. File : suse_11_2_bind-100121.nasl - Type : ACT_GATHER_INFO |
2010-01-26 | Name : The remote openSUSE host is missing a security update. File : suse_11_1_bind-100121.nasl - Type : ACT_GATHER_INFO |
2010-01-22 | Name : The remote name server is affected by a cache poisoning vulnerability. File : bind9_bogus_nxdomain_caching.nasl - Type : ACT_GATHER_INFO |
2010-01-21 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2010-0062.nasl - Type : ACT_GATHER_INFO |
2010-01-21 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2010-0062.nasl - Type : ACT_GATHER_INFO |
2010-01-21 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2010-021.nasl - Type : ACT_GATHER_INFO |
2010-01-21 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-888-1.nasl - Type : ACT_GATHER_INFO |
2010-01-06 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2009-1620.nasl - Type : ACT_GATHER_INFO |
2009-12-08 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-865-1.nasl - Type : ACT_GATHER_INFO |
2009-12-04 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2009-313.nasl - Type : ACT_GATHER_INFO |
2009-12-02 | Name : The remote name server is affected by a cache poisoning vulnerability. File : bind9_dnssec_cache_poisoning.nasl - Type : ACT_GATHER_INFO |
2009-12-01 | Name : The remote openSUSE host is missing a security update. File : suse_11_2_bind-091127.nasl - Type : ACT_GATHER_INFO |
2009-12-01 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_bind-091127.nasl - Type : ACT_GATHER_INFO |
2009-12-01 | Name : The remote openSUSE host is missing a security update. File : suse_11_1_bind-091127.nasl - Type : ACT_GATHER_INFO |
2009-12-01 | Name : The remote openSUSE host is missing a security update. File : suse_11_0_bind-091127.nasl - Type : ACT_GATHER_INFO |
2009-12-01 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2009-1620.nasl - Type : ACT_GATHER_INFO |
2009-11-30 | Name : The remote Fedora host is missing a security update. File : fedora_2009-12233.nasl - Type : ACT_GATHER_INFO |
2009-11-30 | Name : The remote Fedora host is missing a security update. File : fedora_2009-12218.nasl - Type : ACT_GATHER_INFO |
2009-11-30 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2009-304.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:53:13 |
|
2013-05-11 00:51:22 |
|