Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | |||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.843421 |
Categoría: | Ubuntu Local Security Checks |
Título: | Ubuntu Update for bind9 USN-3535-1 |
Resumen: | The remote host is missing an update for the 'bind9'; package(s) announced via the referenced advisory. |
Descripción: | Summary: The remote host is missing an update for the 'bind9' package(s) announced via the referenced advisory. Vulnerability Insight: Jayachandran Palanisamy discovered that the Bind resolver incorrectly handled fetch cleanup sequencing. A remote attacker could possibly use this issue to cause Bind to crash, resulting in a denial of service. Affected Software/OS: bind9 on Ubuntu 17.10, Ubuntu 16.04 LTS, Ubuntu 14.04 LTS Solution: Please Install the Updated Packages. CVSS Score: 5.0 CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2017-3145 BugTraq ID: 102716 http://www.securityfocus.com/bid/102716 Debian Security Information: DSA-4089 (Google Search) https://www.debian.org/security/2018/dsa-4089 https://lists.debian.org/debian-lts-announce/2018/01/msg00029.html RedHat Security Advisories: RHSA-2018:0101 https://access.redhat.com/errata/RHSA-2018:0101 RedHat Security Advisories: RHSA-2018:0102 https://access.redhat.com/errata/RHSA-2018:0102 RedHat Security Advisories: RHSA-2018:0487 https://access.redhat.com/errata/RHSA-2018:0487 RedHat Security Advisories: RHSA-2018:0488 https://access.redhat.com/errata/RHSA-2018:0488 http://www.securitytracker.com/id/1040195 |
Copyright | Copyright (C) 2018 Greenbone Networks GmbH |
Esta es sólo una de 99761 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |