Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.71944
Categoría:Slackware Local Security Checks
Título:Slackware: Security Advisory (SSA:2011-147-01)
Resumen:The remote host is missing an update for the 'bind' package(s) announced via the SSA:2011-147-01 advisory.
Descripción:Summary:
The remote host is missing an update for the 'bind' package(s) announced via the SSA:2011-147-01 advisory.

Vulnerability Insight:
New bind packages are available for Slackware 8.1, 9.0, 9.1, 10.0, 10.1, 10.2,
11.0, 12.0, 12.1, 12.2, 13.0, 13.1, 13.37, and -current to fix security issues.


Here are the details from the Slackware 13.37 ChangeLog:
+--------------------------+
patches/packages/bind-9.7.3_P1-i486-1_slack13.37.txz: Upgraded.
This release fixes security issues:
* A large RRSET from a remote authoritative server that results in
the recursive resolver trying to negatively cache the response can
hit an off by one code error in named, resulting in named crashing.
[RT #24650] [CVE-2011-1910]
* Zones that have a DS record in the parent zone but are also listed
in a DLV and won't validate without DLV could fail to validate. [RT
#24631]
For more information, see:
[links moved to references]
(* Security fix *)
+--------------------------+

Affected Software/OS:
'bind' package(s) on Slackware 8.1, Slackware 9.0, Slackware 9.1, Slackware 10.0, Slackware 10.1, Slackware 10.2, Slackware 11.0, Slackware 12.0, Slackware 12.1, Slackware 12.2, Slackware 13.0, Slackware 13.1, Slackware 13.37, Slackware current.

Solution:
Please install the updated package(s).

CVSS Score:
5.0

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:P

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2011-1910
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html
BugTraq ID: 48007
http://www.securityfocus.com/bid/48007
CERT/CC vulnerability note: VU#795694
http://www.kb.cert.org/vuls/id/795694
Debian Security Information: DSA-2244 (Google Search)
http://www.debian.org/security/2011/dsa-2244
http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061401.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061082.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061405.html
FreeBSD Security Advisory: FreeBSD-SA-11:02
http://security.freebsd.org/advisories/FreeBSD-SA-11:02.bind.asc
HPdes Security Advisory: HPSBUX03235
http://marc.info/?l=bugtraq&m=142180687100892&w=2
HPdes Security Advisory: SSRT101750
http://www.mandriva.com/security/advisories?name=MDVSA-2011:104
http://osvdb.org/72540
http://www.redhat.com/support/errata/RHSA-2011-0845.html
http://www.securitytracker.com/id?1025572
http://secunia.com/advisories/44677
http://secunia.com/advisories/44719
http://secunia.com/advisories/44741
http://secunia.com/advisories/44744
http://secunia.com/advisories/44758
http://secunia.com/advisories/44762
http://secunia.com/advisories/44783
http://secunia.com/advisories/44929
http://slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.685026
SuSE Security Announcement: openSUSE-SU-2011:0603 (Google Search)
https://hermes.opensuse.org/messages/8699912
CopyrightCopyright (C) 2012 Greenbone AG

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.