Page 10 of 95 results (0.010 seconds)

CVSS: 7.5EPSS: 8%CPEs: 1EXPL: 0

29 Jan 2005 — An "incorrect assumption" in the authvalidated validator function in BIND 9.3.0, when DNSSEC is enabled, allows remote attackers to cause a denial of service (named server exit) via crafted DNS packets that cause an internal consistency test (self-check) to fail. • http://secunia.com/advisories/14008 •

CVSS: 9.8EPSS: 2%CPEs: 1EXPL: 0

03 Jul 2002 — Buffer overflow in the DNS resolver code used in libc, glibc, and libbind, as derived from ISC BIND, allows remote malicious DNS servers to cause a denial of service and possibly execute arbitrary code via the stub resolvers. • ftp://ftp.NetBSD.ORG/pub/NetBSD/security/advisories/NetBSD-SA2002-006.txt.asc •

CVSS: 7.5EPSS: 6%CPEs: 6EXPL: 0

18 Jun 2002 — ISC BIND 9 before 9.2.1 allows remote attackers to cause a denial of service (shutdown) via a malformed DNS packet that triggers an error condition that is not properly handled when the rdataset parameter to the dns_message_findtype() function in message.c is not NULL, aka DoS_findtype. • ftp://ftp.caldera.com/pub/updates/OpenUNIX/CSSA-2002-SCO.24.1/CSSA-2002-SCO.24.1.txt •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

21 Jul 2001 — dnskeygen in BIND 8.2.4 and earlier, and dnssec-keygen in BIND 9.1.2 and earlier, set insecure permissions for a HMAC-MD5 shared secret key file used for DNS Transactional Signatures (TSIG), which allows attackers to obtain the keys and perform dynamic DNS updates. • http://www.osvdb.org/5609 • CWE-276: Incorrect Default Permissions •

CVSS: 9.1EPSS: 0%CPEs: 1EXPL: 0

01 Jul 1997 — When compiled with the -DALLOW_UPDATES option, bind allows dynamic updates to the DNS server, allowing for malicious modification of DNS records. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0184 •