English | Deutsch | Español | Português
 UserID:
 Passwd:
new user
 About:   Dedicated  | Advanced  | Standard  | Recurring  | No Risk  | Desktop  | Basic  | Single  | Security Seal  | FAQ
  Price/Feature Summary  | Order  | New Vulnerabilities  | Confidentiality  | Vulnerability Search
 Vulnerability   
Search   
    Search 74154 CVE descriptions
and 39337 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.69771
Category:FreeBSD Local Security Checks
Title:FreeBSD Security Advisory (FreeBSD-SA-11:02.bind.asc)
Summary:FreeBSD Security Advisory (FreeBSD-SA-11:02.bind.asc)
Description:The remote host is missing an update to the system
as announced in the referenced advisory FreeBSD-SA-11:02.bind.asc

BIND 9 is an implementation of the Domain Name System (DNS) protocols.
The named(8) daemon is an Internet Domain Name Server.

DNS Security Extensions (DNSSEC) provides data integrity, origin
authentication and authenticated denial of existence to resolvers.

Very large RRSIG RRsets included in a negative response can trigger
an assertion failure that will crash named(8) due to an off-by-one error
in a buffer size check.

Solution:
Upgrade your system to the appropriate stable release
or security branch dated after the correction date

http://www.securityspace.com/smysecure/catid.html?in=FreeBSD-SA-11:02.bind.asc
Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2011-1910
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html
Debian Security Information: DSA-2244 (Google Search)
http://www.debian.org/security/2011/dsa-2244
http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061082.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061401.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061405.html
FreeBSD Security Advisory: FreeBSD-SA-11:02
http://security.freebsd.org/advisories/FreeBSD-SA-11:02.bind.asc
http://www.mandriva.com/security/advisories?name=MDVSA-2011:104
http://www.redhat.com/support/errata/RHSA-2011-0845.html
http://slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.685026
SuSE Security Announcement: openSUSE-SU-2011:0603 (Google Search)
https://hermes.opensuse.org/messages/8699912
CERT/CC vulnerability note: VU#795694
http://www.kb.cert.org/vuls/id/795694
BugTraq ID: 48007
http://www.securityfocus.com/bid/48007
http://osvdb.org/72540
http://www.securitytracker.com/id?1025572
http://secunia.com/advisories/44719
http://secunia.com/advisories/44741
http://secunia.com/advisories/44744
http://secunia.com/advisories/44758
http://secunia.com/advisories/44762
http://secunia.com/advisories/44677
http://secunia.com/advisories/44783
http://secunia.com/advisories/44929
CopyrightCopyright (c) 2011 E-Soft Inc. http://www.securityspace.com

This is only one of 39337 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

New User Registration
Email:
UserID:
Passwd:
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
   Privacy
Registered User Login
 
UserID:   
Passwd:  

 Forgot userid or passwd?
Email/Userid:




Home | About Us | Contact Us | Partner Programs | Privacy | Mailing Lists | Abuse
Security Audits | Managed DNS | Network Monitoring | Site Analyzer | Internet Research Reports
Web Probe | Whois

© 1998-2014 E-Soft Inc. All rights reserved.