Page 10 of 47 results (0.004 seconds)

CVSS: 5.0EPSS: 11%CPEs: 6EXPL: 0

ISC BIND 9 before 9.2.1 allows remote attackers to cause a denial of service (shutdown) via a malformed DNS packet that triggers an error condition that is not properly handled when the rdataset parameter to the dns_message_findtype() function in message.c is not NULL, aka DoS_findtype. • ftp://ftp.caldera.com/pub/updates/OpenUNIX/CSSA-2002-SCO.24.1/CSSA-2002-SCO.24.1.txt http://archives.neohapsis.com/archives/hp/2002-q3/0022.html http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000494 http://frontal2.mandriva.com/security/advisories?name=MDKSA-2002:038 http://www.cert.org/advisories/CA-2002-15.html http://www.isc.org/index.pl?/sw/bind/bind-security.php http://www.iss.net/security_center/static/9250.php http://www.kb.cert.org/vuls&# •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

dnskeygen in BIND 8.2.4 and earlier, and dnssec-keygen in BIND 9.1.2 and earlier, set insecure permissions for a HMAC-MD5 shared secret key file used for DNS Transactional Signatures (TSIG), which allows attackers to obtain the keys and perform dynamic DNS updates. • http://www.osvdb.org/5609 http://xforce.iss.net/alerts/advise78.php https://exchange.xforce.ibmcloud.com/vulnerabilities/6694 • CWE-276: Incorrect Default Permissions •