English | Deutsch | Español | Português
 UserID:
 Passwd:
new user
 About:   Dedicated  | Advanced  | Standard  | Recurring  | No Risk  | Desktop  | Basic  | Single  | Security Seal  | FAQ
  Price/Feature Summary  | Order  | New Vulnerabilities  | Confidentiality  | Vulnerability Search
 Vulnerability   
Search   
    Search 72151 CVE descriptions
and 38907 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.58011
Category:FreeBSD Local Security Checks
Title:FreeBSD Security Advisory (FreeBSD-SA-07:02.bind.asc)
Summary:FreeBSD Security Advisory (FreeBSD-SA-07:02.bind.asc)
Description:The remote host is missing an update to the system
as announced in the referenced advisory FreeBSD-SA-07:02.bind.asc

BIND 9 is an implementation of the Domain Name System (DNS) protocols.
The named(8) daemon is an Internet domain name server. DNS Security
Extensions (DNSSEC) are additional protocol options that add
authentication and integrity to the DNS protocols.

A type * (ANY) query response containing multiple RRsets can trigger an
assertion failure.

Certain recursive queries can cause the nameserver to crash by using memory
which has already been freed.

Solution:
Upgrade your system to the appropriate stable release
or security branch dated after the correction date

http://www.securityspace.com/smysecure/catid.html?in=FreeBSD-SA-07:02.bind.asc
Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2007-0493
Bugtraq: 20070125 BIND remote exploit (low severity) [Fwd: Internet Systems Consortium Security Advisory.] (Google Search)
http://www.securityfocus.com/archive/1/archive/1/458066/100/0/threaded
http://lists.grok.org.uk/pipermail/full-disclosure/2007-January/052018.html
http://marc.theaimsgroup.com/?l=bind-announce&m=116968519321296&w=2
http://lists.apple.com/archives/security-announce/2007/May/msg00004.html
http://fedoranews.org/cms/node/2507
http://fedoranews.org/cms/node/2537
FreeBSD Security Advisory: FreeBSD-SA-07:02
http://security.freebsd.org/advisories/FreeBSD-SA-07:02.bind.asc
http://security.gentoo.org/glsa/glsa-200702-06.xml
HPdes Security Advisory: HPSBTU02207
https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144
HPdes Security Advisory: SSRT061213
HPdes Security Advisory: SSRT061239
HPdes Security Advisory: SSRT071304
HPdes Security Advisory: HPSBUX02219
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01070495
HPdes Security Advisory: SSRT061273
http://www.mandriva.com/security/advisories?name=MDKSA-2007:030
NETBSD Security Advisory: NetBSD-SA2007-003
http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2007-003.txt.asc
http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.007.html
http://www.redhat.com/support/errata/RHSA-2007-0057.html
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.494157
SuSE Security Announcement: SUSE-SA:2007:014 (Google Search)
http://lists.suse.com/archive/suse-security-announce/2007-Jan/0016.html
http://www.trustix.org/errata/2007/0005
http://www.ubuntu.com/usn/usn-418-1
BugTraq ID: 22229
http://www.securityfocus.com/bid/22229
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9614
http://www.vupen.com/english/advisories/2007/0349
http://www.vupen.com/english/advisories/2007/1401
http://www.vupen.com/english/advisories/2007/1939
http://www.vupen.com/english/advisories/2007/2163
http://www.vupen.com/english/advisories/2007/2315
http://securitytracker.com/id?1017561
http://secunia.com/advisories/23904
http://secunia.com/advisories/23972
http://secunia.com/advisories/23924
http://secunia.com/advisories/23943
http://secunia.com/advisories/23974
http://secunia.com/advisories/23977
http://secunia.com/advisories/24054
http://secunia.com/advisories/24014
http://secunia.com/advisories/24048
http://secunia.com/advisories/24129
http://secunia.com/advisories/24203
http://secunia.com/advisories/24950
http://secunia.com/advisories/24930
http://secunia.com/advisories/25402
http://secunia.com/advisories/25649
CopyrightCopyright (c) 2007 E-Soft Inc. http://www.securityspace.com

This is only one of 38907 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

New User Registration
Email:
UserID:
Passwd:
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
   Privacy
Registered User Login
 
UserID:   
Passwd:  

 Forgot userid or passwd?
Email/Userid:




Home | About Us | Contact Us | Partner Programs | Privacy | Mailing Lists | Abuse
Security Audits | Managed DNS | Network Monitoring | Site Analyzer | Internet Research Reports
Web Probe | Whois

© 1998-2014 E-Soft Inc. All rights reserved.