Page 24 of 177 results (0.012 seconds)

CVSS: 5.0EPSS: 94%CPEs: 238EXPL: 0

Off-by-one error in named in ISC BIND 9.x before 9.7.3-P1, 9.8.x before 9.8.0-P2, 9.4-ESV before 9.4-ESV-R4-P1, and 9.6-ESV before 9.6-ESV-R4-P1 allows remote DNS servers to cause a denial of service (assertion failure and daemon exit) via a negative response containing large RRSIG RRsets. Error de superación de límite (off-by-one) en named de ISC BIND 9.x anteriores a 9.7.3-P1, 9.8.x anteriores a 9.8.0-P2, 9.4-ESV anteriores a 9.4-ESV-R4-P1, y 9.6-ESV anteriores a 9.6-ESV-R4-P1 permite a servidores remotos DNS provocar una denegación de servicio (fallo de aserción y finalización del demonio) a través de una respuesta negativa que contenga RRSIG RRsets de gran tamaño. • http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061082.html http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061401.html http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061405.html http://marc.info/?l=bugtraq&m=142180687100892&w=2 http://osvdb.org/72540 http://secunia.com/advisories/44677 http://secunia.com/advisories/44719 http://secunia.com/advisories/447 • CWE-189: Numeric Errors •

CVSS: 5.0EPSS: 90%CPEs: 1EXPL: 0

ISC BIND 9.8.x before 9.8.0-P1, when Response Policy Zones (RPZ) RRset replacement is enabled, allows remote attackers to cause a denial of service (assertion failure and daemon exit) via an RRSIG query. ISC BIND v9.8.x anterior a v9.8.0-P1, cuando el reemplazo Response Policy Zones (RPZ) RRset es habilitado, permite a atacantes remotos provocar una denegación de servicio (error de aserción y salida del demonio) a través de un consulta RRSIG. • http://secunia.com/advisories/44416 http://www.securityfocus.com/archive/1/517900/100/0/threaded http://www.securityfocus.com/bid/47734 http://www.securitytracker.com/id?1025503 http://www.vupen.com/english/advisories/2011/1183 https://exchange.xforce.ibmcloud.com/vulnerabilities/67297 https://www.isc.org/CVE-2011-1907 • CWE-399: Resource Management Errors •

CVSS: 7.1EPSS: 9%CPEs: 9EXPL: 0

ISC BIND 9.7.1 through 9.7.2-P3, when configured as an authoritative server, allows remote attackers to cause a denial of service (deadlock and daemon hang) by sending a query at the time of (1) an IXFR transfer or (2) a DDNS update. En ISC BIND versión 9.7.1 hasta 9.7.2-P3, cuando está configurado como un servidor autorizado, permite a los atacantes remotos generar una denegación de servicio (punto muerto y suspensión de demonio) al enviar una consulta en el momento de (1) una transferencia IXFR o ( 2) una actualización de DDNS. • http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html http://secunia.com/advisories/43439 http://secunia.com/advisories/43443 http://www.debian.org/security/2011/dsa-2208 http://www.isc.org/software/bind/advisories/cve-2011-0414 http://www.kb.cert.org/vuls/id/449980 http://www.kb.cert.org/vuls/id/559980 http://www.securitytracker.com/id?1025110 http://www.ubuntu.com/usn/USN-1070-1 http://www.vupen.com/english/advisories/2011/0466 http:& • CWE-399: Resource Management Errors •

CVSS: 5.0EPSS: 2%CPEs: 1EXPL: 0

named in ISC BIND 9.7.2-P2 does not check all intended locations for allow-query ACLs, which might allow remote attackers to make successful requests for private DNS records via the standard DNS query mechanism. named en ISC BIND 9.7.2-P2 no comprueba todas las localizaciones previstas para las ACLs "allow-query" (permitir consultas), lo que puede permitir a atacantes remotos realizar peticiones con éxito a registros DNS privados a través del mecanismo de consulta DNS estándar. • http://lists.fedoraproject.org/pipermail/package-announce/2010-December/051963.html http://osvdb.org/69568 http://secunia.com/advisories/42458 http://secunia.com/advisories/42671 http://securitytracker.com/id?1024817 http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.622190 http://www.isc.org/announcement/guidance-regarding-dec-1st-2010-security-advisories http://www.isc.org/software/bind/advisories/cve-2010-3615 http://www.kb.cert.org/vuls/id/510208 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 4.0EPSS: 1%CPEs: 26EXPL: 0

named in ISC BIND 9.6.2 before 9.6.2-P3, 9.6-ESV before 9.6-ESV-R3, and 9.7.x before 9.7.2-P3 does not properly handle the combination of signed negative responses and corresponding RRSIG records in the cache, which allows remote attackers to cause a denial of service (daemon crash) via a query for cached data. named en ISC BIND 9.6.2 anteriores a 9.6.2-P3, 9.6-ESV anteriores a 9.6-ESV-R3, y 9.7.x anteriores a 9.7.2-P3 no maneja apropiadamente la combinación de respuestas negativas firmadas y los correspondientes registros RRSIG en la caché. Lo que permite a atacantes remotos provocar una denegación de servicio (caída del demonio) a través de una petición de datos de la caché. • http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2011-001.txt.asc http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html http://lists.fedoraproject.org/pipermail/package-announce/2010-December/051910.html http://lists.fedoraproject.org/pipermail/package-announce/2010-December/051963.html http://lists.vmware.com/pipermail/security-announce/2011/000126.html http://marc.info/?l=bugtraq&m=130270720601677&w=2 http://secunia.com/advisories/42374 http://secunia.com • CWE-264: Permissions, Privileges, and Access Controls •