Summary
Detail | |||
---|---|---|---|
Vendor | Isc | First view | 2001-07-21 |
Product | Bind | Last view | 2024-02-14 |
Version | 9.1.1 | Type | Application |
Update | rc3 | ||
Edition | * | ||
Language | * | ||
Sofware Edition | - | ||
Target Software | * | ||
Target Hardware | * | ||
Other | * | ||
CPE Product | cpe:2.3:a:isc:bind |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
7.5 | 2024-02-14 | CVE-2023-50387 | Certain DNSSEC aspects of the DNS protocol (in RFC 4033, 4034, 4035, 6840, and related RFCs) allow remote attackers to cause a denial of service (CPU consumption) via one or more DNSSEC responses, aka the "KeyTrap" issue. One of the concerns is that, when there is a zone with many DNSKEY and RRSIG records, the protocol specification implies that an algorithm must evaluate all combinations of DNSKEY and RRSIG records. |
0 | 2024-02-13 | CVE-2023-6516 | To keep its cache database efficient, `named` running as a recursive resolver occasionally attempts to clean up the database. It uses several methods, including some that are asynchronous: a small chunk of memory pointing to the cache element that can be cleaned up is first allocated and then queued for later processing. It was discovered that if the resolver is continuously processing query patterns triggering this type of cache-database maintenance, `named` may not be able to handle the cleanup events in a timely manner. This in turn enables the list of queued cleanup events to grow infinitely large over time, allowing the configured `max-cache-size` limit to be significantly exceeded. This issue affects BIND 9 versions 9.16.0 through 9.16.45 and 9.16.8-S1 through 9.16.45-S1. |
0 | 2024-02-13 | CVE-2023-5679 | A bad interaction between DNS64 and serve-stale may cause `named` to crash with an assertion failure during recursive resolution, when both of these features are enabled. This issue affects BIND 9 versions 9.16.12 through 9.16.45, 9.18.0 through 9.18.21, 9.19.0 through 9.19.19, 9.16.12-S1 through 9.16.45-S1, and 9.18.11-S1 through 9.18.21-S1. |
0 | 2024-02-13 | CVE-2023-5517 | A flaw in query-handling code can cause `named` to exit prematurely with an assertion failure when: - `nxdomain-redirect |
0 | 2024-02-13 | CVE-2023-4408 | The DNS message parsing code in `named` includes a section whose computational complexity is overly high. It does not cause problems for typical DNS traffic, but crafted queries and responses may cause excessive CPU load on the affected `named` instance by exploiting this flaw. This issue affects both authoritative servers and recursive resolvers. This issue affects BIND 9 versions 9.0.0 through 9.16.45, 9.18.0 through 9.18.21, 9.19.0 through 9.19.19, 9.9.3-S1 through 9.11.37-S1, 9.16.8-S1 through 9.16.45-S1, and 9.18.11-S1 through 9.18.21-S1. |
0 | 2023-09-20 | CVE-2023-4236 | A flaw in the networking code handling DNS-over-TLS queries may cause `named` to terminate unexpectedly due to an assertion failure. This happens when internal data structures are incorrectly reused under significant DNS-over-TLS query load. This issue affects BIND 9 versions 9.18.0 through 9.18.18 and 9.18.11-S1 through 9.18.18-S1. |
0 | 2023-09-20 | CVE-2023-3341 | The code that processes control channel messages sent to `named` calls certain functions recursively during packet parsing. Recursion depth is only limited by the maximum accepted packet size; depending on the environment, this may cause the packet-parsing code to run out of available stack memory, causing `named` to terminate unexpectedly. Since each incoming control channel message is fully parsed before its contents are authenticated, exploiting this flaw does not require the attacker to hold a valid RNDC key; only network access to the control channel's configured TCP port is necessary. This issue affects BIND 9 versions 9.2.0 through 9.16.43, 9.18.0 through 9.18.18, 9.19.0 through 9.19.16, 9.9.3-S1 through 9.16.43-S1, and 9.18.0-S1 through 9.18.18-S1. |
0 | 2023-06-21 | CVE-2023-2911 | If the `recursive-clients` quota is reached on a BIND 9 resolver configured with both `stale-answer-enable yes;` and `stale-answer-client-timeout 0;`, a sequence of serve-stale-related lookups could cause `named` to loop and terminate unexpectedly due to a stack overflow. This issue affects BIND 9 versions 9.16.33 through 9.16.41, 9.18.7 through 9.18.15, 9.16.33-S1 through 9.16.41-S1, and 9.18.11-S1 through 9.18.15-S1. |
0 | 2023-06-21 | CVE-2023-2829 | A `named` instance configured to run as a DNSSEC-validating recursive resolver with the Aggressive Use of DNSSEC-Validated Cache (RFC 8198) option (`synth-from-dnssec`) enabled can be remotely terminated using a zone with a malformed NSEC record. This issue affects BIND 9 versions 9.16.8-S1 through 9.16.41-S1 and 9.18.11-S1 through 9.18.15-S1. |
0 | 2023-06-21 | CVE-2023-2828 | Every `named` instance configured to run as a recursive resolver maintains a cache database holding the responses to the queries it has recently sent to authoritative servers. The size limit for that cache database can be configured using the `max-cache-size` statement in the configuration file; it defaults to 90% of the total amount of memory available on the host. When the size of the cache reaches 7/8 of the configured limit, a cache-cleaning algorithm starts to remove expired and/or least-recently used RRsets from the cache, to keep memory use below the configured limit. It has been discovered that the effectiveness of the cache-cleaning algorithm used in `named` can be severely diminished by querying the resolver for specific RRsets in a certain order, effectively allowing the configured `max-cache-size` limit to be significantly exceeded. This issue affects BIND 9 versions 9.11.0 through 9.16.41, 9.18.0 through 9.18.15, 9.19.0 through 9.19.13, 9.11.3-S1 through 9.16.41-S1, and 9.18.11-S1 through 9.18.15-S1. |
7.5 | 2023-01-26 | CVE-2022-3924 | This issue can affect BIND 9 resolvers with `stale-answer-enable yes;` that also make use of the option `stale-answer-client-timeout`, configured with a value greater than zero. If the resolver receives many queries that require recursion, there will be a corresponding increase in the number of clients that are waiting for recursion to complete. If there are sufficient clients already waiting when a new client query is received so that it is necessary to SERVFAIL the longest waiting client (see BIND 9 ARM `recursive-clients` limit and soft quota), then it is possible for a race to occur between providing a stale answer to this older client and sending an early timeout SERVFAIL, which may cause an assertion failure. This issue affects BIND 9 versions 9.16.12 through 9.16.36, 9.18.0 through 9.18.10, 9.19.0 through 9.19.8, and 9.16.12-S1 through 9.16.36-S1. |
7.5 | 2023-01-26 | CVE-2022-3736 | BIND 9 resolver can crash when stale cache and stale answers are enabled, option `stale-answer-client-timeout` is set to a positive integer, and the resolver receives an RRSIG query. This issue affects BIND 9 versions 9.16.12 through 9.16.36, 9.18.0 through 9.18.10, 9.19.0 through 9.19.8, and 9.16.12-S1 through 9.16.36-S1. |
7.5 | 2023-01-26 | CVE-2022-3094 | Sending a flood of dynamic DNS updates may cause `named` to allocate large amounts of memory. This, in turn, may cause `named` to exit due to a lack of free memory. We are not aware of any cases where this has been exploited. Memory is allocated prior to the checking of access permissions (ACLs) and is retained during the processing of a dynamic update from a client whose access credentials are accepted. Memory allocated to clients that are not permitted to send updates is released immediately upon rejection. The scope of this vulnerability is limited therefore to trusted clients who are permitted to make dynamic zone changes. If a dynamic update is REFUSED, memory will be released again very quickly. Therefore it is only likely to be possible to degrade or stop `named` by sending a flood of unaccepted dynamic updates comparable in magnitude to a query flood intended to achieve the same detrimental outcome. BIND 9.11 and earlier branches are also affected, but through exhaustion of internal resources rather than memory constraints. This may reduce performance but should not be a significant problem for most servers. Therefore we don't intend to address this for BIND versions prior to BIND 9.16. This issue affects BIND 9 versions 9.16.0 through 9.16.36, 9.18.0 through 9.18.10, 9.19.0 through 9.19.8, and 9.16.8-S1 through 9.16.36-S1. |
7.5 | 2022-09-21 | CVE-2022-38178 | By spoofing the target resolver with responses that have a malformed EdDSA signature, an attacker can trigger a small memory leak. It is possible to gradually erode available memory to the point where named crashes for lack of resources. |
7.5 | 2022-09-21 | CVE-2022-38177 | By spoofing the target resolver with responses that have a malformed ECDSA signature, an attacker can trigger a small memory leak. It is possible to gradually erode available memory to the point where named crashes for lack of resources. |
7.5 | 2022-09-21 | CVE-2022-3080 | By sending specific queries to the resolver, an attacker can cause named to crash. |
7.5 | 2022-09-21 | CVE-2022-2906 | An attacker can leverage this flaw to gradually erode available memory to the point where named crashes for lack of resources. Upon restart the attacker would have to begin again, but nevertheless there is the potential to deny service. |
8.2 | 2022-09-21 | CVE-2022-2881 | The underlying bug might cause read past end of the buffer and either read memory it should not read, or crash the process. |
5.3 | 2022-09-21 | CVE-2022-2795 | By flooding the target resolver with queries exploiting this flaw an attacker can significantly impair the resolver's performance, effectively denying legitimate clients access to the DNS resolution service. |
7.5 | 2022-05-19 | CVE-2022-1183 | On vulnerable configurations, the named daemon may, in some circumstances, terminate with an assertion failure. Vulnerable configurations are those that include a reference to http within the listen-on statements in their named.conf. TLS is used by both DNS over TLS (DoT) and DNS over HTTPS (DoH), but configurations using DoT alone are unaffected. Affects BIND 9.18.0 -> 9.18.2 and version 9.19.0 of the BIND 9.19 development branch. |
5.3 | 2022-03-23 | CVE-2022-0396 | BIND 9.16.11 -> 9.16.26, 9.17.0 -> 9.18.0 and versions 9.16.11-S1 -> 9.16.26-S1 of the BIND Supported Preview Edition. Specifically crafted TCP streams can cause connections to BIND to remain in CLOSE_WAIT status for an indefinite period of time, even after the client has terminated the connection. |
4 | 2022-03-23 | CVE-2021-25220 | BIND 9.11.0 -> 9.11.36 9.12.0 -> 9.16.26 9.17.0 -> 9.18.0 BIND Supported Preview Editions: 9.11.4-S1 -> 9.11.36-S1 9.16.8-S1 -> 9.16.26-S1 Versions of BIND 9 earlier than those shown - back to 9.1.0, including Supported Preview Editions - are also believed to be affected but have not been tested as they are EOL. The cache could become poisoned with incorrect records leading to queries being made to the wrong servers, which might also result in false information being returned to clients. |
5.3 | 2021-10-27 | CVE-2021-25219 | In BIND 9.3.0 -> 9.11.35, 9.12.0 -> 9.16.21, and versions 9.9.3-S1 -> 9.11.35-S1 and 9.16.8-S1 -> 9.16.21-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -> 9.17.18 of the BIND 9.17 development branch, exploitation of broken authoritative servers using a flaw in response processing can cause degradation in BIND resolver performance. The way the lame cache is currently designed makes it possible for its internal data structures to grow almost infinitely, which may cause significant delays in client query processing. |
9.8 | 2021-04-29 | CVE-2021-25216 | In BIND 9.5.0 -> 9.11.29, 9.12.0 -> 9.16.13, and versions BIND 9.11.3-S1 -> 9.11.29-S1 and 9.16.8-S1 -> 9.16.13-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -> 9.17.1 of the BIND 9.17 development branch, BIND servers are vulnerable if they are running an affected version and are configured to use GSS-TSIG features. In a configuration which uses BIND's default settings the vulnerable code path is not exposed, but a server can be rendered vulnerable by explicitly setting values for the tkey-gssapi-keytab or tkey-gssapi-credential configuration options. Although the default configuration is not vulnerable, GSS-TSIG is frequently used in networks where BIND is integrated with Samba, as well as in mixed-server environments that combine BIND servers with Active Directory domain controllers. For servers that meet these conditions, the ISC SPNEGO implementation is vulnerable to various attacks, depending on the CPU architecture for which BIND was built: For named binaries compiled for 64-bit platforms, this flaw can be used to trigger a buffer over-read, leading to a server crash. For named binaries compiled for 32-bit platforms, this flaw can be used to trigger a server crash due to a buffer overflow and possibly also to achieve remote code execution. We have determined that standard SPNEGO implementations are available in the MIT and Heimdal Kerberos libraries, which support a broad range of operating systems, rendering the ISC implementation unnecessary and obsolete. Therefore, to reduce the attack surface for BIND users, we will be removing the ISC SPNEGO implementation in the April releases of BIND 9.11 and 9.16 (it had already been dropped from BIND 9.17). We would not normally remove something from a stable ESV (Extended Support Version) of BIND, but since system libraries can replace the ISC SPNEGO implementation, we have made an exception in this case for reasons of stability and security. |
7.5 | 2021-04-29 | CVE-2021-25215 | In BIND 9.0.0 -> 9.11.29, 9.12.0 -> 9.16.13, and versions BIND 9.9.3-S1 -> 9.11.29-S1 and 9.16.8-S1 -> 9.16.13-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -> 9.17.11 of the BIND 9.17 development branch, when a vulnerable version of named receives a query for a record triggering the flaw described above, the named process will terminate due to a failed assertion check. The vulnerability affects all currently maintained BIND 9 branches (9.11, 9.11-S, 9.16, 9.16-S, 9.17) as well as all other versions of BIND 9. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
28% (20) | CWE-617 | Reachable Assertion |
17% (12) | CWE-20 | Improper Input Validation |
5% (4) | CWE-770 | Allocation of Resources Without Limits or Throttling |
5% (4) | CWE-189 | Numeric Errors |
4% (3) | CWE-401 | Failure to Release Memory Before Removing Last Reference ('Memory L... |
4% (3) | CWE-400 | Uncontrolled Resource Consumption ('Resource Exhaustion') |
2% (2) | CWE-787 | Out-of-bounds Write |
2% (2) | CWE-416 | Use After Free |
2% (2) | CWE-404 | Improper Resource Shutdown or Release |
2% (2) | CWE-125 | Out-of-bounds Read |
2% (2) | CWE-19 | Data Handling |
1% (1) | CWE-772 | Missing Release of Resource after Effective Lifetime |
1% (1) | CWE-732 | Incorrect Permission Assignment for Critical Resource |
1% (1) | CWE-444 | Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggli... |
1% (1) | CWE-428 | Unquoted Search Path or Element |
1% (1) | CWE-362 | Race Condition |
1% (1) | CWE-345 | Insufficient Verification of Data Authenticity |
1% (1) | CWE-327 | Use of a Broken or Risky Cryptographic Algorithm |
1% (1) | CWE-295 | Certificate Issues |
1% (1) | CWE-290 | Authentication Bypass by Spoofing |
1% (1) | CWE-287 | Improper Authentication |
1% (1) | CWE-276 | Incorrect Default Permissions |
1% (1) | CWE-269 | Improper Privilege Management |
1% (1) | CWE-252 | Unchecked Return Value |
1% (1) | CWE-120 | Buffer Copy without Checking Size of Input ('Classic Buffer Overflo... |
CAPEC : Common Attack Pattern Enumeration & Classification
id | Name |
---|---|
CAPEC-1 | Accessing Functionality Not Properly Constrained by ACLs |
CAPEC-19 | Embedding Scripts within Scripts |
CAPEC-81 | Web Logs Tampering |
Open Source Vulnerability Database (OSVDB)
id | Description |
---|---|
77159 | ISC BIND Recursive Query Parsing Remote DoS |
72540 | ISC BIND Caching Resolver Large RRSIG RRsets Negative Caching Remote DoS |
69559 | ISC BIND named Key Algorithm Rollover Weakness |
68271 | ISC BIND DNSSEC Query Validation Response Signature Handling Remote DoS |
62008 | ISC BIND Secure Response Refetch Weakness Unspecified Issue |
62007 | ISC BIND Recursive Client Query CNAME / DNAME Response DNS Cache Poisoning |
61853 | ISC BIND DNSSEC Validation Crafted NXDOMAIN Request Cache Poisoning |
60493 | ISC BIND DNSSEC Recursive Query Additional Section Cache Poisoning |
53115 | ISC BIND EVP_VerifyFinal() / DSA_do_verify() SSL/TLS Signature Validation Wea... |
51368 | OpenSSL DSA_verify Function SSL/TLS Signature Validation Weakness |
41211 | ISC BIND libbind inet_network() Function Off-By-One Memory Corruption |
40811 | FreeBSD libc inet_network() Function Off-By-One Memory Corruption DoS |
31923 | ISC BIND Crafted ANY Request Response Multiple RRsets DoS |
28557 | ISC BIND SIG Query Multiple RRsets Response DoS |
5609 | ISC BIND dnskeygen HMAC-MD5 Shared Secret Key File Disclosure |
OpenVAS Exploits
id | Description |
---|---|
2012-12-31 | Name : Fedora Update for bind FEDORA-2012-19822 File : nvt/gb_fedora_2012_19822_bind_fc16.nasl |
2012-12-14 | Name : Fedora Update for bind FEDORA-2012-19830 File : nvt/gb_fedora_2012_19830_bind_fc17.nasl |
2012-12-13 | Name : SuSE Update for bind openSUSE-SU-2012:0722-1 (bind) File : nvt/gb_suse_2012_0722_1.nasl |
2012-12-13 | Name : SuSE Update for bind openSUSE-SU-2012:1192-1 (bind) File : nvt/gb_suse_2012_1192_1.nasl |
2012-12-13 | Name : SuSE Update for bind openSUSE-SU-2012:1372-1 (bind) File : nvt/gb_suse_2012_1372_1.nasl |
2012-11-16 | Name : VMSA-2012-0016: VMware security updates for vSphere API and ESX Service Console File : nvt/gb_VMSA-2012-0016.nasl |
2012-10-29 | Name : Debian Security Advisory DSA 2560-1 (bind9) File : nvt/deb_2560_1.nasl |
2012-10-23 | Name : Fedora Update for bind-dyndb-ldap FEDORA-2012-15965 File : nvt/gb_fedora_2012_15965_bind-dyndb-ldap_fc17.nasl |
2012-10-23 | Name : Fedora Update for bind FEDORA-2012-15965 File : nvt/gb_fedora_2012_15965_bind_fc17.nasl |
2012-10-23 | Name : Fedora Update for dhcp FEDORA-2012-15965 File : nvt/gb_fedora_2012_15965_dhcp_fc17.nasl |
2012-10-23 | Name : Fedora Update for dnsperf FEDORA-2012-15965 File : nvt/gb_fedora_2012_15965_dnsperf_fc17.nasl |
2012-10-23 | Name : Fedora Update for bind-dyndb-ldap FEDORA-2012-15981 File : nvt/gb_fedora_2012_15981_bind-dyndb-ldap_fc16.nasl |
2012-10-23 | Name : Fedora Update for bind FEDORA-2012-15981 File : nvt/gb_fedora_2012_15981_bind_fc16.nasl |
2012-10-23 | Name : Fedora Update for dhcp FEDORA-2012-15981 File : nvt/gb_fedora_2012_15981_dhcp_fc16.nasl |
2012-10-23 | Name : Fedora Update for dnsperf FEDORA-2012-15981 File : nvt/gb_fedora_2012_15981_dnsperf_fc16.nasl |
2012-10-16 | Name : CentOS Update for bind CESA-2012:1363 centos5 File : nvt/gb_CESA-2012_1363_bind_centos5.nasl |
2012-10-16 | Name : CentOS Update for bind CESA-2012:1363 centos6 File : nvt/gb_CESA-2012_1363_bind_centos6.nasl |
2012-10-16 | Name : CentOS Update for bind97 CESA-2012:1364 centos5 File : nvt/gb_CESA-2012_1364_bind97_centos5.nasl |
2012-10-16 | Name : RedHat Update for bind RHSA-2012:1363-01 File : nvt/gb_RHSA-2012_1363-01_bind.nasl |
2012-10-16 | Name : RedHat Update for bind97 RHSA-2012:1364-01 File : nvt/gb_RHSA-2012_1364-01_bind97.nasl |
2012-10-13 | Name : FreeBSD Ports: bind99 File : nvt/freebsd_bind992.nasl |
2012-10-11 | Name : Mandriva Update for bind MDVSA-2012:162 (bind) File : nvt/gb_mandriva_MDVSA_2012_162.nasl |
2012-10-11 | Name : Ubuntu Update for bind9 USN-1601-1 File : nvt/gb_ubuntu_USN_1601_1.nasl |
2012-10-03 | Name : Fedora Update for bind FEDORA-2012-14030 File : nvt/gb_fedora_2012_14030_bind_fc16.nasl |
2012-10-03 | Name : Mandriva Update for bind MDVSA-2012:152-1 (bind) File : nvt/gb_mandriva_MDVSA_2012_152_1.nasl |
Information Assurance Vulnerability Management (IAVM)
id | Description |
---|---|
2015-A-0208 | Multiple Vulnerabilities in ISC BIND Severity: Category I - VMSKEY: V0061377 |
2015-B-0099 | McAfee Firewall Enterprise Denial of Service Vulnerability Severity: Category I - VMSKEY: V0061291 |
2013-A-0179 | Apple Mac OS X Security Update 2013-004 Severity: Category I - VMSKEY: V0040373 |
2013-A-0031 | Multiple Security Vulnerabilities in VMware ESX 4.1 and ESXi 4.1 Severity: Category I - VMSKEY: V0036787 |
2012-A-0189 | Multiple Vulnerabilities in VMware ESXi 4.1 and ESX 4.1 Severity: Category I - VMSKEY: V0035032 |
2011-A-0066 | Multiple Vulnerabilities in VMware Products Severity: Category I - VMSKEY: V0027158 |
Snort® IPS/IDS
Date | Description |
---|---|
2020-09-02 | BIND DNS server TSIG denial of service attempt RuleID : 54630 - Type : PROTOCOL-DNS - Revision : 1 |
2020-01-03 | ISC BIND deny-answer-aliases denial of service attempt RuleID : 52344 - Type : SERVER-OTHER - Revision : 1 |
2020-01-03 | ISC BIND deny-answer-aliases denial of service attempt RuleID : 52343 - Type : SERVER-OTHER - Revision : 1 |
2019-12-05 | ISC BIND DHCP client DNAME resource record parsing denial of service attempt RuleID : 52078 - Type : SERVER-OTHER - Revision : 1 |
2019-09-24 | ISC BIND multiple ENDS Key Tag options denial of service attempt RuleID : 51144 - Type : SERVER-OTHER - Revision : 1 |
2018-03-27 | ISC BIND malformed data channel authentication message denial of service attempt RuleID : 45738 - Type : SERVER-OTHER - Revision : 1 |
2017-09-06 | ISC BIND malformed control channel authentication message denial of service a... RuleID : 43846 - Type : SERVER-OTHER - Revision : 2 |
2016-11-30 | ISC BIND 9 DNS query overly long name denial of service attempt RuleID : 40579 - Type : SERVER-OTHER - Revision : 2 |
2016-11-08 | ISC BIND isc__buffer_add assertion failure denial of service attempt RuleID : 40344 - Type : PROTOCOL-DNS - Revision : 2 |
2016-05-27 | ISC BIND malformed control channel authentication message denial of service a... RuleID : 38622 - Type : SERVER-OTHER - Revision : 4 |
2016-03-14 | ISC BIND zero length OPENPGPKEY rdata response attempt RuleID : 36130 - Type : PROTOCOL-DNS - Revision : 4 |
2015-10-20 | ISC BIND DNSSEC response unsupported cryptographic algorithm attempt RuleID : 36056 - Type : PROTOCOL-DNS - Revision : 2 |
2015-10-20 | ISC BIND DNSSEC response unsupported DNSKEY cryptographic algorithm attempt RuleID : 36055 - Type : PROTOCOL-DNS - Revision : 3 |
2015-09-03 | ISC BIND TKEY query processing denial of service attempt RuleID : 35943 - Type : PROTOCOL-DNS - Revision : 3 |
2015-09-03 | ISC BIND TKEY query processing denial of service attempt RuleID : 35942 - Type : PROTOCOL-DNS - Revision : 3 |
2015-09-03 | ISC BIND TKEY Query denial of service attempt RuleID : 35425 - Type : SERVER-OTHER - Revision : 3 |
2015-09-03 | ISC BIND TKEY Query denial of service attempt RuleID : 35424 - Type : SERVER-OTHER - Revision : 3 |
2014-01-10 | dns zone transfer with zero-length rdata attempt RuleID : 23608 - Type : PROTOCOL-DNS - Revision : 3 |
2014-01-10 | ISC BIND DNSSEC authority response record overflow attempt RuleID : 21421 - Type : PROTOCOL-DNS - Revision : 7 |
2014-01-10 | ISC BIND DNSSEC authority response record overflow attempt RuleID : 19125 - Type : PROTOCOL-DNS - Revision : 5 |
2014-01-10 | ISC BIND DNSSEC Validation Multiple RRsets DoS RuleID : 17680 - Type : SERVER-OTHER - Revision : 10 |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2019-01-10 | Name: The remote device is affected by multiple vulnerabilities. File: juniper_space_jsa10917_184R1.nasl - Type: ACT_GATHER_INFO |
2019-01-03 | Name: The remote Fedora host is missing a security update. File: fedora_2018-5417ca3713.nasl - Type: ACT_GATHER_INFO |
2019-01-03 | Name: The remote Fedora host is missing a security update. File: fedora_2018-a54e46032f.nasl - Type: ACT_GATHER_INFO |
2019-01-03 | Name: The remote Fedora host is missing a security update. File: fedora_2018-f22b937f52.nasl - Type: ACT_GATHER_INFO |
2018-11-28 | Name: The remote name server is affected by a policy bypass which enables an unauth... File: bind9_CVE-2018-5741.nasl - Type: ACT_GATHER_INFO |
2018-11-27 | Name: The remote Virtuozzo host is missing a security update. File: Virtuozzo_VZLSA-2017-1679.nasl - Type: ACT_GATHER_INFO |
2018-11-05 | Name: The remote device is missing a vendor-supplied security patch. File: f5_bigip_SOL98528405.nasl - Type: ACT_GATHER_INFO |
2018-11-02 | Name: The remote device is missing a vendor-supplied security patch. File: f5_bigip_SOL08613310.nasl - Type: ACT_GATHER_INFO |
2018-10-26 | Name: The remote EulerOS Virtualization host is missing a security update. File: EulerOS_SA-2018-1328.nasl - Type: ACT_GATHER_INFO |
2018-10-26 | Name: The remote EulerOS Virtualization host is missing a security update. File: EulerOS_SA-2018-1343.nasl - Type: ACT_GATHER_INFO |
2018-10-15 | Name: The remote Fedora host is missing a security update. File: fedora_2018-54d84b0b0c.nasl - Type: ACT_GATHER_INFO |
2018-09-27 | Name: The remote EulerOS host is missing a security update. File: EulerOS_SA-2018-1281.nasl - Type: ACT_GATHER_INFO |
2018-09-27 | Name: The remote EulerOS host is missing a security update. File: EulerOS_SA-2018-1282.nasl - Type: ACT_GATHER_INFO |
2018-09-27 | Name: The remote Amazon Linux 2 host is missing a security update. File: al2_ALAS-2018-1082.nasl - Type: ACT_GATHER_INFO |
2018-09-20 | Name: The remote Amazon Linux AMI host is missing a security update. File: ala_ALAS-2018-1082.nasl - Type: ACT_GATHER_INFO |
2018-08-31 | Name: The remote Debian host is missing a security update. File: debian_DLA-1485.nasl - Type: ACT_GATHER_INFO |
2018-08-29 | Name: The remote CentOS host is missing one or more security updates. File: centos_RHSA-2018-2570.nasl - Type: ACT_GATHER_INFO |
2018-08-29 | Name: The remote CentOS host is missing one or more security updates. File: centos_RHSA-2018-2571.nasl - Type: ACT_GATHER_INFO |
2018-08-23 | Name: The remote Fedora host is missing a security update. File: fedora_2018-90f8fbd58e.nasl - Type: ACT_GATHER_INFO |
2018-08-17 | Name: The remote PhotonOS host is missing multiple security updates. File: PhotonOS_PHSA-2017-0021.nasl - Type: ACT_GATHER_INFO |
2018-08-16 | Name: The remote name server is affected by a denial of service vulnerability. File: bind9_9122_p1.nasl - Type: ACT_GATHER_INFO |
2018-08-13 | Name: The remote Slackware host is missing a security update. File: Slackware_SSA_2018-222-01.nasl - Type: ACT_GATHER_INFO |
2018-04-18 | Name: The remote Amazon Linux 2 host is missing a security update. File: al2_ALAS-2018-954.nasl - Type: ACT_GATHER_INFO |
2018-02-22 | Name: The remote Amazon Linux AMI host is missing a security update. File: ala_ALAS-2018-954.nasl - Type: ACT_GATHER_INFO |
2018-02-13 | Name: The remote EulerOS host is missing a security update. File: EulerOS_SA-2018-1037.nasl - Type: ACT_GATHER_INFO |