Executive Summary
Summary | |
---|---|
Title | VMware ESX/ESXi SLPD denial of service vulnerability and ESX third party updates for Service Console packages bind, pam, and rpm. |
Informations | |||
---|---|---|---|
Name | VMSA-2011-0004 | First vendor Publication | 2011-03-07 |
Vendor | VMware | Last vendor Modification | 2011-03-07 |
Severity (Vendor) | N/A | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:L/AC:L/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 7.2 | Attack Range | Local |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 3.9 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
a. Service Location Protocol daemon DoS This patch fixes a denial-of-service vulnerability in the Service Location Protocol daemon (SLPD). Exploitation of this vulnerability could cause SLPD to consume significant CPU resources. VMware would like to thank Nicolas Gregoire and US CERT for reporting this issue to us. The Common Vulnerabilities and Exposures Project (cve.mitre.org) has assigned the name CVE-2010-3609 to this issue. b. Service Console update for bind This patch updates the bind-libs and bind-utils RPMs to version 9.3.6-4.P1.el5_5.3, which resolves multiple security issues. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the names CVE-2010-3613, CVE-2010-3614, and CVE-2010-3762 to these issues. c. Service Console update for pam This patch updates the pam RPM to pam_0.99.6.2-3.27.5437.vmw, which resolves multiple security issues with PAM modules. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the names CVE-2010-3316, CVE-2010-3435, and CVE-2010-3853 to these issues. d. Service Console update for rpm, rpm-libs, rpm-python, and popt This patch updates rpm, rpm-libs, and rpm-python RPMs to 4.4.2.3-20.el5_5.1, and popt to version 1.10.2.3-20.el5_5.1, which resolves a security issue. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2010-2059 to this issue. |
Original Source
Url : http://www.vmware.com/security/advisories/VMSA-2011-0004.html |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
50 % | CWE-264 | Permissions, Privileges, and Access Controls |
50 % | CWE-20 | Improper Input Validation |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:12601 | |||
Oval ID: | oval:org.mitre.oval:def:12601 | ||
Title: | HP-UX Running BIND, Remote Denial of Service (DoS) | ||
Description: | named in ISC BIND 9.6.2 before 9.6.2-P3, 9.6-ESV before 9.6-ESV-R3, and 9.7.x before 9.7.2-P3 does not properly handle the combination of signed negative responses and corresponding RRSIG records in the cache, which allows remote attackers to cause a denial of service (daemon crash) via a query for cached data. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2010-3613 | Version: | 12 |
Platform(s): | HP-UX 11 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:12722 | |||
Oval ID: | oval:org.mitre.oval:def:12722 | ||
Title: | DSA-2130-1 bind9 -- several | ||
Description: | Several remote vulnerabilities have been discovered in BIND, an implementation of the DNS protocol suite. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2010-3762 When DNSSEC validation is enabled, BIND does not properly handle certain bad signatures if multiple trust anchors exist for a single zone, which allows remote attackers to cause a denial of service via a DNS query. CVE-2010-3614 BIND does not properly determine the security status of an NS RRset during a DNSKEY algorithm rollover, which may lead to zone unavailability during rollovers. CVE-2010-3613 BIND does not properly handle the combination of signed negative responses and corresponding RRSIG records in the cache, which allows remote attackers to cause a denial of service via a query for cached data. In addition, this security update improves compatibility with previously installed versions of the bind9 package. As a result, it is necessary to initiate the update with "apt-get dist-upgrade" instead of "apt-get update". For the stable distribution, these problems have been fixed in version 1:9.6.ESV.R3+dfsg-0+lenny1. For the upcoming stable distribution and the unstable distribution, these problems have been fixed in version 1:9.7.2.dfsg.P3-1. We recommend that you upgrade your bind9 packages. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-2130-1 CVE-2010-3762 CVE-2010-3614 CVE-2010-3613 | Version: | 7 |
Platform(s): | Debian GNU/Linux 5.0 | Product(s): | bind9 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:13982 | |||
Oval ID: | oval:org.mitre.oval:def:13982 | ||
Title: | USN-1118-1 -- openslp, openslp-dfsg vulnerability | ||
Description: | openslp-dfsg: OpenSLP is an implementation of the Service Location Protocol - openslp: OpenSLP is an implementation of the Service Location Protocol An attacker could send crafted input to OpenSLP and cause it to hang. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1118-1 CVE-2010-3609 | Version: | 5 |
Platform(s): | Ubuntu 8.04 Ubuntu 10.10 Ubuntu 6.06 Ubuntu 9.10 Ubuntu 10.04 | Product(s): | openslp openslp-dfsg |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:19576 | |||
Oval ID: | oval:org.mitre.oval:def:19576 | ||
Title: | VMware ESX/ESXi SLPD denial of service vulnerability and ESX third party updates for Service Console packages bind, pam, and rpm. | ||
Description: | pam_namespace.c in the pam_namespace module in Linux-PAM (aka pam) before 1.1.3 uses the environment of the invoking application or service during execution of the namespace.init script, which might allow local users to gain privileges by running a setuid program that relies on the pam_namespace PAM check, as demonstrated by the sudo program. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2010-3853 | Version: | 4 |
Platform(s): | VMWare ESX Server 4.1 VMWare ESX Server 4.0 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:19724 | |||
Oval ID: | oval:org.mitre.oval:def:19724 | ||
Title: | VMware ESXi and ESX updates to third party library and ESX Service Console | ||
Description: | lib/fsm.c in RPM 4.8.0 and unspecified 4.7.x and 4.6.x versions, and RPM before 4.4.3, does not properly reset the metadata of an executable file during replacement of the file in an RPM package upgrade, which might allow local users to gain privileges by creating a hard link to a vulnerable (1) setuid or (2) setgid file. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2010-2059 | Version: | 4 |
Platform(s): | VMWare ESX Server 4.1 VMWare ESX Server 4.0 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:19744 | |||
Oval ID: | oval:org.mitre.oval:def:19744 | ||
Title: | VMware ESX/ESXi SLPD denial of service vulnerability and ESX third party updates for Service Console packages bind, pam, and rpm. | ||
Description: | lib/fsm.c in RPM 4.8.0 and unspecified 4.7.x and 4.6.x versions, and RPM before 4.4.3, does not properly reset the metadata of an executable file during replacement of the file in an RPM package upgrade, which might allow local users to gain privileges by creating a hard link to a vulnerable (1) setuid or (2) setgid file. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2010-2059 | Version: | 4 |
Platform(s): | VMWare ESX Server 4.1 VMWare ESX Server 4.0 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:19932 | |||
Oval ID: | oval:org.mitre.oval:def:19932 | ||
Title: | VMware ESX/ESXi SLPD denial of service vulnerability and ESX third party updates for Service Console packages bind, pam, and rpm. | ||
Description: | The run_coprocess function in pam_xauth.c in the pam_xauth module in Linux-PAM (aka pam) before 1.1.2 does not check the return values of the setuid, setgid, and setgroups system calls, which might allow local users to read arbitrary files by executing a program that relies on the pam_xauth PAM check. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2010-3316 | Version: | 4 |
Platform(s): | VMWare ESX Server 4.1 VMWare ESX Server 4.0 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:19985 | |||
Oval ID: | oval:org.mitre.oval:def:19985 | ||
Title: | VMware ESX/ESXi SLPD denial of service vulnerability and ESX third party updates for Service Console packages bind, pam, and rpm. | ||
Description: | ISC BIND before 9.7.2-P2, when DNSSEC validation is enabled, does not properly handle certain bad signatures if multiple trust anchors exist for a single zone, which allows remote attackers to cause a denial of service (daemon crash) via a DNS query. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2010-3762 | Version: | 4 |
Platform(s): | VMWare ESX Server 4.1 VMWare ESX Server 4.0 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:20251 | |||
Oval ID: | oval:org.mitre.oval:def:20251 | ||
Title: | VMware ESX/ESXi SLPD denial of service vulnerability and ESX third party updates for Service Console packages bind, pam, and rpm. | ||
Description: | The (1) pam_env and (2) pam_mail modules in Linux-PAM (aka pam) before 1.1.2 use root privileges during read access to files and directories that belong to arbitrary user accounts, which might allow local users to obtain sensitive information by leveraging this filesystem activity, as demonstrated by a symlink attack on the .pam_environment file in a user's home directory. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2010-3435 | Version: | 4 |
Platform(s): | VMWare ESX Server 4.1 VMWare ESX Server 4.0 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:20346 | |||
Oval ID: | oval:org.mitre.oval:def:20346 | ||
Title: | VMware ESX/ESXi SLPD denial of service vulnerability and ESX third party updates for Service Console packages bind, pam, and rpm. | ||
Description: | named in ISC BIND 9.x before 9.6.2-P3, 9.7.x before 9.7.2-P3, 9.4-ESV before 9.4-ESV-R4, and 9.6-ESV before 9.6-ESV-R3 does not properly determine the security status of an NS RRset during a DNSKEY algorithm rollover, which might allow remote attackers to cause a denial of service (DNSSEC validation error) by triggering a rollover. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2010-3614 | Version: | 4 |
Platform(s): | VMWare ESX Server 4.1 VMWare ESX Server 4.0 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:20446 | |||
Oval ID: | oval:org.mitre.oval:def:20446 | ||
Title: | VMware ESX/ESXi SLPD denial of service vulnerability and ESX third party updates for Service Console packages bind, pam, and rpm. | ||
Description: | named in ISC BIND 9.6.2 before 9.6.2-P3, 9.6-ESV before 9.6-ESV-R3, and 9.7.x before 9.7.2-P3 does not properly handle the combination of signed negative responses and corresponding RRSIG records in the cache, which allows remote attackers to cause a denial of service (daemon crash) via a query for cached data. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2010-3613 | Version: | 4 |
Platform(s): | VMWare ESX Server 4.1 VMWare ESX Server 4.0 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:20535 | |||
Oval ID: | oval:org.mitre.oval:def:20535 | ||
Title: | VMware ESX/ESXi SLPD denial of service vulnerability and ESX third party updates for Service Console packages bind, pam, and rpm. | ||
Description: | The extension parser in slp_v2message.c in OpenSLP 1.2.1, and other versions before SVN revision 1647, as used in Service Location Protocol daemon (SLPD) in VMware ESX 4.0 and 4.1 and ESXi 4.0 and 4.1, allows remote attackers to cause a denial of service (infinite loop) via a packet with a "next extension offset" that references this extension or a previous extension. NOTE: some of these details are obtained from third party information. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2010-3609 | Version: | 4 |
Platform(s): | VMWare ESX Server 4.1 VMWare ESX Server 4.0 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:20785 | |||
Oval ID: | oval:org.mitre.oval:def:20785 | ||
Title: | Denial of service vulnerability in BIND | ||
Description: | named in ISC BIND 9.x before 9.6.2-P3, 9.7.x before 9.7.2-P3, 9.4-ESV before 9.4-ESV-R4, and 9.6-ESV before 9.6-ESV-R3 does not properly determine the security status of an NS RRset during a DNSKEY algorithm rollover, which might allow remote attackers to cause a denial of service (DNSSEC validation error) by triggering a rollover. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2010-3614 | Version: | 4 |
Platform(s): | IBM AIX 6.1 IBM AIX 7.1 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:20922 | |||
Oval ID: | oval:org.mitre.oval:def:20922 | ||
Title: | Denial of service vulnerability in BIND | ||
Description: | named in ISC BIND 9.6.2 before 9.6.2-P3, 9.6-ESV before 9.6-ESV-R3, and 9.7.x before 9.7.2-P3 does not properly handle the combination of signed negative responses and corresponding RRSIG records in the cache, which allows remote attackers to cause a denial of service (daemon crash) via a query for cached data. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2010-3613 | Version: | 4 |
Platform(s): | IBM AIX 6.1 IBM AIX 7.1 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:21999 | |||
Oval ID: | oval:org.mitre.oval:def:21999 | ||
Title: | RHSA-2010:0679: rpm security and bug fix update (Moderate) | ||
Description: | lib/fsm.c in RPM 4.8.0 and unspecified 4.7.x and 4.6.x versions, and RPM before 4.4.3, does not properly reset the metadata of an executable file during replacement of the file in an RPM package upgrade, which might allow local users to gain privileges by creating a hard link to a vulnerable (1) setuid or (2) setgid file. | ||
Family: | unix | Class: | patch |
Reference(s): | RHSA-2010:0679-01 CESA-2010:0679 CVE-2010-2059 | Version: | 4 |
Platform(s): | Red Hat Enterprise Linux 5 CentOS Linux 5 | Product(s): | rpm |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:22234 | |||
Oval ID: | oval:org.mitre.oval:def:22234 | ||
Title: | RHSA-2010:0975: bind security update (Important) | ||
Description: | named in ISC BIND 9.x before 9.6.2-P3, 9.7.x before 9.7.2-P3, 9.4-ESV before 9.4-ESV-R4, and 9.6-ESV before 9.6-ESV-R3 does not properly determine the security status of an NS RRset during a DNSKEY algorithm rollover, which might allow remote attackers to cause a denial of service (DNSSEC validation error) by triggering a rollover. | ||
Family: | unix | Class: | patch |
Reference(s): | RHSA-2010:0975-01 CVE-2010-3613 CVE-2010-3614 | Version: | 29 |
Platform(s): | Red Hat Enterprise Linux 6 | Product(s): | bind |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:22294 | |||
Oval ID: | oval:org.mitre.oval:def:22294 | ||
Title: | RHSA-2010:0976: bind security update (Important) | ||
Description: | ISC BIND before 9.7.2-P2, when DNSSEC validation is enabled, does not properly handle certain bad signatures if multiple trust anchors exist for a single zone, which allows remote attackers to cause a denial of service (daemon crash) via a DNS query. | ||
Family: | unix | Class: | patch |
Reference(s): | RHSA-2010:0976-01 CESA-2010:0976 CVE-2010-3613 CVE-2010-3614 CVE-2010-3762 | Version: | 42 |
Platform(s): | Red Hat Enterprise Linux 5 CentOS Linux 5 | Product(s): | bind |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:22813 | |||
Oval ID: | oval:org.mitre.oval:def:22813 | ||
Title: | ELSA-2010:0679: rpm security and bug fix update (Moderate) | ||
Description: | lib/fsm.c in RPM 4.8.0 and unspecified 4.7.x and 4.6.x versions, and RPM before 4.4.3, does not properly reset the metadata of an executable file during replacement of the file in an RPM package upgrade, which might allow local users to gain privileges by creating a hard link to a vulnerable (1) setuid or (2) setgid file. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2010:0679-01 CVE-2010-2059 | Version: | 6 |
Platform(s): | Oracle Linux 5 | Product(s): | rpm |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:23144 | |||
Oval ID: | oval:org.mitre.oval:def:23144 | ||
Title: | ELSA-2010:0976: bind security update (Important) | ||
Description: | ISC BIND before 9.7.2-P2, when DNSSEC validation is enabled, does not properly handle certain bad signatures if multiple trust anchors exist for a single zone, which allows remote attackers to cause a denial of service (daemon crash) via a DNS query. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2010:0976-01 CVE-2010-3613 CVE-2010-3614 CVE-2010-3762 | Version: | 17 |
Platform(s): | Oracle Linux 5 | Product(s): | bind |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:23440 | |||
Oval ID: | oval:org.mitre.oval:def:23440 | ||
Title: | ELSA-2010:0975: bind security update (Important) | ||
Description: | named in ISC BIND 9.x before 9.6.2-P3, 9.7.x before 9.7.2-P3, 9.4-ESV before 9.4-ESV-R4, and 9.6-ESV before 9.6-ESV-R3 does not properly determine the security status of an NS RRset during a DNSKEY algorithm rollover, which might allow remote attackers to cause a denial of service (DNSSEC validation error) by triggering a rollover. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2010:0975-01 CVE-2010-3613 CVE-2010-3614 | Version: | 13 |
Platform(s): | Oracle Linux 6 | Product(s): | bind |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:27985 | |||
Oval ID: | oval:org.mitre.oval:def:27985 | ||
Title: | DEPRECATED: ELSA-2010-0975 -- bind security update (important) | ||
Description: | [32:9.7.0-5.P2.1] - fix CVE-2010-3613 and CVE-2010-3614 | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2010-0975 CVE-2010-3613 CVE-2010-3614 | Version: | 4 |
Platform(s): | Oracle Linux 6 | Product(s): | bind |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:28094 | |||
Oval ID: | oval:org.mitre.oval:def:28094 | ||
Title: | DEPRECATED: ELSA-2010-0679 -- rpm security and bug fix update (moderate) | ||
Description: | [4.4.2.3-20.el5_5.1] - make the sbits removal behavior consistent with all the RHELs - add proper suffix for Z branch [4.4.2.3-19] - fix CVE-2010-2059, fails to drop SUID/SGID bits on package upgrade (#626707) - fix SELinux memory leak (#627630), patch from Florian Festi | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2010-0679 CVE-2010-2059 | Version: | 4 |
Platform(s): | Oracle Linux 5 | Product(s): | rpm |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:28216 | |||
Oval ID: | oval:org.mitre.oval:def:28216 | ||
Title: | DEPRECATED: ELSA-2010-0976 -- bind security update (important) | ||
Description: | [30:9.3.6-4.P1.3] - fixes for CVE-2010-3762, CVE-2010-3613 and CVE-2010-3614 | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2010-0976 CVE-2010-3613 CVE-2010-3614 CVE-2010-3762 | Version: | 4 |
Platform(s): | Oracle Linux 5 | Product(s): | bind |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2012-08-24 | Name : Mandriva Update for openslp MDVSA-2012:141 (openslp) File : nvt/gb_mandriva_MDVSA_2012_141.nasl |
2012-08-10 | Name : Gentoo Security Advisory GLSA 201206-31 (pam) File : nvt/glsa_201206_31.nasl |
2012-08-10 | Name : Gentoo Security Advisory GLSA 201206-26 (RPM) File : nvt/glsa_201206_26.nasl |
2012-08-10 | Name : Gentoo Security Advisory GLSA 201206-01 (bind) File : nvt/glsa_201206_01.nasl |
2012-07-30 | Name : CentOS Update for bind CESA-2010:1000 centos4 x86_64 File : nvt/gb_CESA-2010_1000_bind_centos4_x86_64.nasl |
2012-03-16 | Name : VMSA-2011-0004.3 VMware ESX/ESXi SLPD denial of service vulnerability and ESX... File : nvt/gb_VMSA-2011-0004.nasl |
2012-03-15 | Name : VMSA-2012-0001 VMware ESXi and ESX updates to third party library and ESX Ser... File : nvt/gb_VMSA-2012-0001.nasl |
2011-10-20 | Name : Mac OS X v10.6.8 Multiple Vulnerabilities (2011-006) File : nvt/gb_macosx_su11-006.nasl |
2011-08-09 | Name : CentOS Update for bind CESA-2010:0976 centos5 i386 File : nvt/gb_CESA-2010_0976_bind_centos5_i386.nasl |
2011-08-09 | Name : CentOS Update for popt CESA-2010:0679 centos5 i386 File : nvt/gb_CESA-2010_0679_popt_centos5_i386.nasl |
2011-06-06 | Name : Ubuntu Update for pam USN-1140-2 File : nvt/gb_ubuntu_USN_1140_2.nasl |
2011-06-06 | Name : Ubuntu Update for pam USN-1140-1 File : nvt/gb_ubuntu_USN_1140_1.nasl |
2011-06-06 | Name : Ubuntu Update for bind9 USN-1139-1 File : nvt/gb_ubuntu_USN_1139_1.nasl |
2011-05-10 | Name : Ubuntu Update for openslp-dfsg USN-1118-1 File : nvt/gb_ubuntu_USN_1118_1.nasl |
2011-05-05 | Name : HP-UX Update for BIND HPSBUX02655 File : nvt/gb_hp_ux_HPSBUX02655.nasl |
2011-01-31 | Name : CentOS Update for bind CESA-2010:1000 centos4 i386 File : nvt/gb_CESA-2010_1000_bind_centos4_i386.nasl |
2011-01-14 | Name : ISC BIND 9 < 9.7.2-P2 Multiple Vulnerabilities File : nvt/gb_bind_9_7_2_P2.nasl |
2011-01-14 | Name : ISC BIND 9 'RRSIG' Record Type Negative Cache Remote Denial of Service Vulner... File : nvt/gb_bind_multiple_vuln_01_11.nasl |
2010-12-28 | Name : RedHat Update for bind RHSA-2010:0976-01 File : nvt/gb_RHSA-2010_0976-01_bind.nasl |
2010-12-28 | Name : Mandriva Update for bind MDVSA-2010:253 (bind) File : nvt/gb_mandriva_MDVSA_2010_253.nasl |
2010-12-28 | Name : RedHat Update for bind RHSA-2010:1000-01 File : nvt/gb_RHSA-2010_1000-01_bind.nasl |
2010-12-23 | Name : Fedora Update for bind FEDORA-2010-18469 File : nvt/gb_fedora_2010_18469_bind_fc14.nasl |
2010-12-23 | Name : Fedora Update for bind-dyndb-ldap FEDORA-2010-18521 File : nvt/gb_fedora_2010_18521_bind-dyndb-ldap_fc13.nasl |
2010-12-23 | Name : Fedora Update for bind FEDORA-2010-18521 File : nvt/gb_fedora_2010_18521_bind_fc13.nasl |
2010-12-23 | Name : Fedora Update for dnsperf FEDORA-2010-18521 File : nvt/gb_fedora_2010_18521_dnsperf_fc13.nasl |
2010-12-09 | Name : Ubuntu Update for bind9 vulnerabilities USN-1025-1 File : nvt/gb_ubuntu_USN_1025_1.nasl |
2010-12-02 | Name : Fedora Update for pam FEDORA-2010-17155 File : nvt/gb_fedora_2010_17155_pam_fc14.nasl |
2010-11-23 | Name : Fedora Update for pam FEDORA-2010-17133 File : nvt/gb_fedora_2010_17133_pam_fc12.nasl |
2010-11-16 | Name : Mandriva Update for pam MDVSA-2010:220 (pam) File : nvt/gb_mandriva_MDVSA_2010_220.nasl |
2010-11-16 | Name : Fedora Update for pam FEDORA-2010-17112 File : nvt/gb_fedora_2010_17112_pam_fc13.nasl |
2010-11-16 | Name : RedHat Update for pam RHSA-2010:0819-01 File : nvt/gb_RHSA-2010_0819-01_pam.nasl |
2010-09-30 | Name : ISC BIND Denial Of Service and Security Bypass Vulnerability File : nvt/gb_bind_43573.nasl |
2010-09-22 | Name : Mandriva Update for rpm MDVSA-2010:180 (rpm) File : nvt/gb_mandriva_MDVSA_2010_180.nasl |
2010-09-10 | Name : RedHat Update for rpm RHSA-2010:0679-01 File : nvt/gb_RHSA-2010_0679-01_rpm.nasl |
2010-09-10 | Name : RedHat Update for rpm RHSA-2010:0678-01 File : nvt/gb_RHSA-2010_0678-01_rpm.nasl |
2010-09-10 | Name : CentOS Update for popt CESA-2010:0678 centos4 i386 File : nvt/gb_CESA-2010_0678_popt_centos4_i386.nasl |
2010-07-12 | Name : Fedora Update for rpm FEDORA-2010-9829 File : nvt/gb_fedora_2010_9829_rpm_fc13.nasl |
2010-07-12 | Name : Fedora Update for rpm FEDORA-2010-10617 File : nvt/gb_fedora_2010_10617_rpm_fc12.nasl |
0000-00-00 | Name : Slackware Advisory SSA:2010-350-01 bind File : nvt/esoft_slk_ssa_2010_350_01.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
71019 | VMware ESX Server / ESXi Service Location Protocol Daemon Unspecified DoS VMware ESX Server and ESXi contains a flaw that may allow a denial of service. The issue is triggered when an unspecified error occurs in the Service Location Protocol daemon, and will result in a loss of availability. No further details have been provided. |
69559 | ISC BIND named Key Algorithm Rollover Weakness ISC BIND named contains a flaw when acting as a DNSSEC validating resolver. The issue is triggered when querying a zone undergoing a key algorithm rollover. This may allow a remote attacker to mark certain zone data as insecure. |
69558 | ISC BIND named RRSIG Negative Caching DoS ISC BIND contains a flaw that may allow a remote denial of service. The issue is triggered when the named program does not properly clear matching RRSIG records from the cache when negatively caching a 'NO DATA'. This can be exploited to result in loss of availability. |
68994 | Linux-PAM pam_xauth Module run_coprocess() Function Process Limit Bypass Linux-PAM contains a flaw that may allow an attacker to gain access to unauthorized privileges. The issue is triggered when the "pam_xauth" module incorrectly checks the return values of the "setuid()" and "setgid()" functions when dropping privileges, allowing a remote attacker to gain escalated privileges. |
68993 | Linux-PAM pam_mail Module Arbitrary Mail File Enumeration Linux-PAM contains a flaw that may lead to an unauthorized information disclosure. Â The issue is triggered when an error in the 'pam_mail' module occurs when dropping privileges, which will disclose the presence of certain mail files to a local attacker. |
68992 | Linux-PAM pam_namespace Module namespace Init Script Environment Handling Loc... Linux-PAM contains a flaw that may allow an attacker to gain access to unauthorized privileges. The issue is triggered when an error in the 'pam_namespace' module when executing the namespace init script occurs, allowing a local attacker to use crafted environment variables when running a setuid program to gain elevated privileges. |
68271 | ISC BIND DNSSEC Query Validation Response Signature Handling Remote DoS |
65144 | RPM Package Manager Package Upgrade POSIX File Capabilities Weakness |
65143 | RPM Package Manager Package Upgrade SetUID/SetGID Weakness |
Information Assurance Vulnerability Management (IAVM)
Date | Description |
---|---|
2012-02-02 | IAVM : 2012-A-0020 - Multiple Vulnerabilities in VMware ESX 4.1 and ESXi 4.1 Severity : Category I - VMSKEY : V0031252 |
2011-05-12 | IAVM : 2011-A-0066 - Multiple Vulnerabilities in VMware Products Severity : Category I - VMSKEY : V0027158 |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2017-07-10 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201707-05.nasl - Type : ACT_GATHER_INFO |
2016-03-04 | Name : The remote VMware ESX / ESXi host is missing a security-related patch. File : vmware_VMSA-2011-0004_remote.nasl - Type : ACT_GATHER_INFO |
2016-03-03 | Name : The remote VMware ESXi / ESX host is missing a security-related patch. File : vmware_VMSA-2012-0001_remote.nasl - Type : ACT_GATHER_INFO |
2015-09-18 | Name : The remote device is missing a vendor-supplied security patch. File : f5_bigip_SOL15172.nasl - Type : ACT_GATHER_INFO |
2015-09-04 | Name : The remote Debian host is missing a security update. File : debian_DLA-304.nasl - Type : ACT_GATHER_INFO |
2015-05-29 | Name : The remote Fedora host is missing a security update. File : fedora_2015-7561.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : suse_11_3_bind-101207.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : suse_11_3_openslp-101012.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : suse_11_3_pam-111025.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2010-1000.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2010-0976.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2010-0975.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2010-0891.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2010-0819.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2010-0679.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2010-0678.nasl - Type : ACT_GATHER_INFO |
2013-04-20 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2013-111.nasl - Type : ACT_GATHER_INFO |
2013-01-24 | Name : The remote AIX host is missing a security patch. File : aix_IV01118.nasl - Type : ACT_GATHER_INFO |
2013-01-24 | Name : The remote AIX host is missing a security patch. File : aix_IV01119.nasl - Type : ACT_GATHER_INFO |
2013-01-24 | Name : The remote AIX host is missing a security patch. File : aix_IZ99391.nasl - Type : ACT_GATHER_INFO |
2012-09-06 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2012-141.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20100907_rpm_on_SL4_x.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20100907_rpm_on_SL5_x.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20101101_pam_on_SL5_x.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20101116_pam_on_SL6_x.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20101213_bind_on_SL5_x.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20101220_bind_on_SL4_x.nasl - Type : ACT_GATHER_INFO |
2012-06-26 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201206-31.nasl - Type : ACT_GATHER_INFO |
2012-06-25 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201206-26.nasl - Type : ACT_GATHER_INFO |
2012-06-21 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201206-01.nasl - Type : ACT_GATHER_INFO |
2012-01-31 | Name : The remote VMware ESXi / ESX host is missing one or more security-related pat... File : vmware_VMSA-2012-0001.nasl - Type : ACT_GATHER_INFO |
2011-12-13 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_pam-7814.nasl - Type : ACT_GATHER_INFO |
2011-12-13 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_pam-111025.nasl - Type : ACT_GATHER_INFO |
2011-11-03 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_pam-7815.nasl - Type : ACT_GATHER_INFO |
2011-10-13 | Name : The remote host is missing a Mac OS X update that fixes several security issues. File : macosx_SecUpd2011-006.nasl - Type : ACT_GATHER_INFO |
2011-06-13 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1118-1.nasl - Type : ACT_GATHER_INFO |
2011-06-13 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1139-1.nasl - Type : ACT_GATHER_INFO |
2011-06-13 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1140-1.nasl - Type : ACT_GATHER_INFO |
2011-06-13 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1140-2.nasl - Type : ACT_GATHER_INFO |
2011-05-28 | Name : The remote Slackware host is missing a security update. File : Slackware_SSA_2010-350-01.nasl - Type : ACT_GATHER_INFO |
2011-05-05 | Name : The remote openSUSE host is missing a security update. File : suse_11_2_openslp-101012.nasl - Type : ACT_GATHER_INFO |
2011-05-05 | Name : The remote openSUSE host is missing a security update. File : suse_11_2_bind-101207.nasl - Type : ACT_GATHER_INFO |
2011-05-05 | Name : The remote openSUSE host is missing a security update. File : suse_11_1_openslp-101012.nasl - Type : ACT_GATHER_INFO |
2011-03-08 | Name : The remote VMware ESXi / ESX host is missing one or more security-related pat... File : vmware_VMSA-2011-0004.nasl - Type : ACT_GATHER_INFO |
2011-01-28 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2010-1000.nasl - Type : ACT_GATHER_INFO |
2011-01-21 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_popt-101209.nasl - Type : ACT_GATHER_INFO |
2011-01-21 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_openslp-101012.nasl - Type : ACT_GATHER_INFO |
2010-12-21 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2010-1000.nasl - Type : ACT_GATHER_INFO |
2010-12-15 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2010-253.nasl - Type : ACT_GATHER_INFO |
2010-12-14 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2010-0976.nasl - Type : ACT_GATHER_INFO |
2010-12-14 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2010-0976.nasl - Type : ACT_GATHER_INFO |
2010-12-14 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2010-0975.nasl - Type : ACT_GATHER_INFO |
2010-12-12 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2130.nasl - Type : ACT_GATHER_INFO |
2010-12-09 | Name : The remote Fedora host is missing a security update. File : fedora_2010-18469.nasl - Type : ACT_GATHER_INFO |
2010-12-08 | Name : The remote Fedora host is missing one or more security updates. File : fedora_2010-18521.nasl - Type : ACT_GATHER_INFO |
2010-12-03 | Name : The remote name server is affected by multiple vulnerabilities. File : bind9_972_p3.nasl - Type : ACT_GATHER_INFO |
2010-12-02 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1025-1.nasl - Type : ACT_GATHER_INFO |
2010-12-02 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_openslp-101013.nasl - Type : ACT_GATHER_INFO |
2010-12-02 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_popt-100706.nasl - Type : ACT_GATHER_INFO |
2010-11-30 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_openslp-7187.nasl - Type : ACT_GATHER_INFO |
2010-11-24 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2010-0819.nasl - Type : ACT_GATHER_INFO |
2010-11-18 | Name : The remote Fedora host is missing a security update. File : fedora_2010-17133.nasl - Type : ACT_GATHER_INFO |
2010-11-18 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2010-0891.nasl - Type : ACT_GATHER_INFO |
2010-11-08 | Name : The remote Fedora host is missing a security update. File : fedora_2010-17155.nasl - Type : ACT_GATHER_INFO |
2010-11-05 | Name : The remote Fedora host is missing a security update. File : fedora_2010-17112.nasl - Type : ACT_GATHER_INFO |
2010-11-04 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2010-220.nasl - Type : ACT_GATHER_INFO |
2010-11-02 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2010-0819.nasl - Type : ACT_GATHER_INFO |
2010-10-11 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_popt-7069.nasl - Type : ACT_GATHER_INFO |
2010-10-06 | Name : The remote name server is affected by multiple vulnerabilities. File : bind9_972_p2.nasl - Type : ACT_GATHER_INFO |
2010-09-17 | Name : The remote openSUSE host is missing a security update. File : suse_11_2_rpm-100609.nasl - Type : ACT_GATHER_INFO |
2010-09-17 | Name : The remote openSUSE host is missing a security update. File : suse_11_1_popt-100609.nasl - Type : ACT_GATHER_INFO |
2010-09-13 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2010-180.nasl - Type : ACT_GATHER_INFO |
2010-09-13 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2010-0679.nasl - Type : ACT_GATHER_INFO |
2010-09-12 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2010-0678.nasl - Type : ACT_GATHER_INFO |
2010-09-08 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2010-0679.nasl - Type : ACT_GATHER_INFO |
2010-09-08 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2010-0678.nasl - Type : ACT_GATHER_INFO |
2010-07-26 | Name : The remote openSUSE host is missing a security update. File : suse_11_0_popt-100609.nasl - Type : ACT_GATHER_INFO |
2010-07-08 | Name : The remote Fedora host is missing a security update. File : fedora_2010-9829.nasl - Type : ACT_GATHER_INFO |
2010-07-07 | Name : The remote Fedora host is missing a security update. File : fedora_2010-10617.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2016-03-05 13:26:43 |
|
2014-02-17 12:07:19 |
|
2013-12-14 21:19:32 |
|
2013-11-11 12:41:39 |
|