Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.58011
Categoría:FreeBSD Local Security Checks
Título:FreeBSD Security Advisory (FreeBSD-SA-07:02.bind.asc)
Resumen:The remote host is missing an update to the system; as announced in the referenced advisory FreeBSD-SA-07:02.bind.asc
Descripción:Summary:
The remote host is missing an update to the system
as announced in the referenced advisory FreeBSD-SA-07:02.bind.asc

Vulnerability Insight:
BIND 9 is an implementation of the Domain Name System (DNS) protocols.
The named(8) daemon is an Internet domain name server. DNS Security
Extensions (DNSSEC) are additional protocol options that add
authentication and integrity to the DNS protocols.

A type * (ANY) query response containing multiple RRsets can trigger an
assertion failure.

Certain recursive queries can cause the nameserver to crash by using memory
which has already been freed.

Solution:
Upgrade your system to the appropriate stable release
or security branch dated after the correction date.

CVSS Score:
7.8

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:C

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2007-0493
1017561
http://securitytracker.com/id?1017561
2007-0005
http://www.trustix.org/errata/2007/0005
20070125 BIND remote exploit (low severity) [Fwd: Internet Systems Consortium Security Advisory.]
http://lists.grok.org.uk/pipermail/full-disclosure/2007-January/052018.html
http://www.securityfocus.com/archive/1/458066/100/0/threaded
22229
http://www.securityfocus.com/bid/22229
23904
http://secunia.com/advisories/23904
23924
http://secunia.com/advisories/23924
23943
http://secunia.com/advisories/23943
23972
http://secunia.com/advisories/23972
23974
http://secunia.com/advisories/23974
23977
http://secunia.com/advisories/23977
24014
http://secunia.com/advisories/24014
24048
http://secunia.com/advisories/24048
24054
http://secunia.com/advisories/24054
24129
http://secunia.com/advisories/24129
24203
http://secunia.com/advisories/24203
24930
http://secunia.com/advisories/24930
24950
http://secunia.com/advisories/24950
25402
http://secunia.com/advisories/25402
25649
http://secunia.com/advisories/25649
ADV-2007-0349
http://www.vupen.com/english/advisories/2007/0349
ADV-2007-1401
http://www.vupen.com/english/advisories/2007/1401
ADV-2007-1939
http://www.vupen.com/english/advisories/2007/1939
ADV-2007-2163
http://www.vupen.com/english/advisories/2007/2163
ADV-2007-2315
http://www.vupen.com/english/advisories/2007/2315
APPLE-SA-2007-05-24
http://lists.apple.com/archives/security-announce/2007/May/msg00004.html
FEDORA-2007-147
http://fedoranews.org/cms/node/2507
FEDORA-2007-164
http://fedoranews.org/cms/node/2537
FreeBSD-SA-07:02
http://security.freebsd.org/advisories/FreeBSD-SA-07:02.bind.asc
GLSA-200702-06
http://security.gentoo.org/glsa/glsa-200702-06.xml
HPSBTU02207
https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144
HPSBUX02219
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01070495
MDKSA-2007:030
http://www.mandriva.com/security/advisories?name=MDKSA-2007:030
NetBSD-SA2007-003
http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2007-003.txt.asc
OpenPKG-SA-2007.007
http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.007.html
RHSA-2007:0057
http://www.redhat.com/support/errata/RHSA-2007-0057.html
SSA:2007-026-01
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.494157
SSRT061213
SSRT061239
SSRT061273
SSRT071304
SUSE-SA:2007:014
http://lists.suse.com/archive/suse-security-announce/2007-Jan/0016.html
USN-418-1
http://www.ubuntu.com/usn/usn-418-1
[bind-announce] 20070125 Internet Systems Consortium Security Advisory.
http://marc.info/?l=bind-announce&m=116968519321296&w=2
http://docs.info.apple.com/article.html?artnum=305530
http://www.isc.org/index.pl?/sw/bind/bind-security.php
http://www.isc.org/index.pl?/sw/bind/view/?release=9.2.8
http://www.isc.org/index.pl?/sw/bind/view/?release=9.3.4
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04952488
https://issues.rpath.com/browse/RPL-989
oval:org.mitre.oval:def:9614
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9614
CopyrightCopyright (C) 2008 E-Soft Inc.

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.