Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.71963
Category:Slackware Local Security Checks
Title:Slackware: Security Advisory (SSA:2011-224-01)
Summary:The remote host is missing an update for the 'bind' package(s) announced via the SSA:2011-224-01 advisory.
Description:Summary:
The remote host is missing an update for the 'bind' package(s) announced via the SSA:2011-224-01 advisory.

Vulnerability Insight:
New bind packages are available for Slackware 8.1, 9.0, 9.1, 10.0, 10.1, 10.2,
11.0, 12.0, 12.1, 12.2, 13.0, 13.1, 13.37, and -current to fix security issues.


Here are the details from the Slackware 13.37 ChangeLog:
+--------------------------+
patches/packages/bind-9.7.4-i486-1_slack13.37.txz: Upgraded.
This BIND update addresses a couple of security issues:
* named, set up to be a caching resolver, is vulnerable to a user
querying a domain with very large resource record sets (RRSets)
when trying to negatively cache the response. Due to an off-by-one
error, caching the response could cause named to crash. [RT #24650]
[CVE-2011-1910]
* Change #2912 (see CHANGES) exposed a latent bug in the DNS message
processing code that could allow certain UPDATE requests to crash
named. [RT #24777] [CVE-2011-2464]
For more information, see:
[links moved to references]
(* Security fix *)
+--------------------------+

Affected Software/OS:
'bind' package(s) on Slackware 8.1, Slackware 9.0, Slackware 9.1, Slackware 10.0, Slackware 10.1, Slackware 10.2, Slackware 11.0, Slackware 12.0, Slackware 12.1, Slackware 12.2, Slackware 13.0, Slackware 13.1, Slackware 13.37, Slackware current.

Solution:
Please install the updated package(s).

CVSS Score:
5.0

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2011-1910
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html
BugTraq ID: 48007
http://www.securityfocus.com/bid/48007
CERT/CC vulnerability note: VU#795694
http://www.kb.cert.org/vuls/id/795694
Debian Security Information: DSA-2244 (Google Search)
http://www.debian.org/security/2011/dsa-2244
http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061401.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061082.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061405.html
FreeBSD Security Advisory: FreeBSD-SA-11:02
http://security.freebsd.org/advisories/FreeBSD-SA-11:02.bind.asc
HPdes Security Advisory: HPSBUX03235
http://marc.info/?l=bugtraq&m=142180687100892&w=2
HPdes Security Advisory: SSRT101750
http://www.mandriva.com/security/advisories?name=MDVSA-2011:104
http://osvdb.org/72540
http://www.redhat.com/support/errata/RHSA-2011-0845.html
http://www.securitytracker.com/id?1025572
http://secunia.com/advisories/44677
http://secunia.com/advisories/44719
http://secunia.com/advisories/44741
http://secunia.com/advisories/44744
http://secunia.com/advisories/44758
http://secunia.com/advisories/44762
http://secunia.com/advisories/44783
http://secunia.com/advisories/44929
http://slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.685026
SuSE Security Announcement: openSUSE-SU-2011:0603 (Google Search)
https://hermes.opensuse.org/messages/8699912
Common Vulnerability Exposure (CVE) ID: CVE-2011-2464
BugTraq ID: 48566
http://www.securityfocus.com/bid/48566
Bugtraq: 20110705 Security Advisory: CVE-2011-2464 - ISC BIND 9 Remote packet Denial of Service against Authoritative and Recursive Servers (Google Search)
http://www.securityfocus.com/archive/1/518749/100/0/threaded
CERT/CC vulnerability note: VU#142646
http://www.kb.cert.org/vuls/id/142646
Debian Security Information: DSA-2272 (Google Search)
http://www.debian.org/security/2011/dsa-2272
http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062846.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062522.html
HPdes Security Advisory: HPSBUX02719
http://marc.info/?l=bugtraq&m=131983337229394&w=2
HPdes Security Advisory: SSRT100658
http://www.mandriva.com/security/advisories?name=MDVSA-2011:115
http://osvdb.org/73605
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13997
http://www.redhat.com/support/errata/RHSA-2011-0926.html
http://www.securitytracker.com/id?1025742
http://secunia.com/advisories/45082
http://secunia.com/advisories/45089
http://secunia.com/advisories/45143
http://secunia.com/advisories/45177
http://secunia.com/advisories/45185
http://secunia.com/advisories/45223
http://secunia.com/advisories/45410
http://secunia.com/advisories/45412
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.377171
SuSE Security Announcement: SUSE-SA:2011:029 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00002.html
SuSE Security Announcement: SUSE-SU-2011:0759 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00004.html
SuSE Security Announcement: openSUSE-SU-2011:0788 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00006.html
https://www.ubuntu.com/usn/USN-1163-1/
XForce ISS Database: iscbind-update-dos(68375)
https://exchange.xforce.ibmcloud.com/vulnerabilities/68375
CopyrightCopyright (C) 2012 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.