![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.71944 |
Categoría: | Slackware Local Security Checks |
Título: | Slackware: Security Advisory (SSA:2011-147-01) |
Resumen: | The remote host is missing an update for the 'bind' package(s) announced via the SSA:2011-147-01 advisory. |
Descripción: | Summary: The remote host is missing an update for the 'bind' package(s) announced via the SSA:2011-147-01 advisory. Vulnerability Insight: New bind packages are available for Slackware 8.1, 9.0, 9.1, 10.0, 10.1, 10.2, 11.0, 12.0, 12.1, 12.2, 13.0, 13.1, 13.37, and -current to fix security issues. Here are the details from the Slackware 13.37 ChangeLog: +--------------------------+ patches/packages/bind-9.7.3_P1-i486-1_slack13.37.txz: Upgraded. This release fixes security issues: * A large RRSET from a remote authoritative server that results in the recursive resolver trying to negatively cache the response can hit an off by one code error in named, resulting in named crashing. [RT #24650] [CVE-2011-1910] * Zones that have a DS record in the parent zone but are also listed in a DLV and won't validate without DLV could fail to validate. [RT #24631] For more information, see: [links moved to references] (* Security fix *) +--------------------------+ Affected Software/OS: 'bind' package(s) on Slackware 8.1, Slackware 9.0, Slackware 9.1, Slackware 10.0, Slackware 10.1, Slackware 10.2, Slackware 11.0, Slackware 12.0, Slackware 12.1, Slackware 12.2, Slackware 13.0, Slackware 13.1, Slackware 13.37, Slackware current. Solution: Please install the updated package(s). CVSS Score: 5.0 CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2011-1910 http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html BugTraq ID: 48007 http://www.securityfocus.com/bid/48007 CERT/CC vulnerability note: VU#795694 http://www.kb.cert.org/vuls/id/795694 Debian Security Information: DSA-2244 (Google Search) http://www.debian.org/security/2011/dsa-2244 http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061401.html http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061082.html http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061405.html FreeBSD Security Advisory: FreeBSD-SA-11:02 http://security.freebsd.org/advisories/FreeBSD-SA-11:02.bind.asc HPdes Security Advisory: HPSBUX03235 http://marc.info/?l=bugtraq&m=142180687100892&w=2 HPdes Security Advisory: SSRT101750 http://www.mandriva.com/security/advisories?name=MDVSA-2011:104 http://osvdb.org/72540 http://www.redhat.com/support/errata/RHSA-2011-0845.html http://www.securitytracker.com/id?1025572 http://secunia.com/advisories/44677 http://secunia.com/advisories/44719 http://secunia.com/advisories/44741 http://secunia.com/advisories/44744 http://secunia.com/advisories/44758 http://secunia.com/advisories/44762 http://secunia.com/advisories/44783 http://secunia.com/advisories/44929 http://slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.685026 SuSE Security Announcement: openSUSE-SU-2011:0603 (Google Search) https://hermes.opensuse.org/messages/8699912 |
Copyright | Copyright (C) 2012 Greenbone AG |
Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |