|Category:||Debian Local Security Checks|
|Title:||Debian: Security Advisory for bind9 (DSA-4857-1)|
|Summary:||The remote host is missing an update for the 'bind9'; package(s) announced via the DSA-4857-1 advisory.|
The remote host is missing an update for the 'bind9'
package(s) announced via the DSA-4857-1 advisory.
A buffer overflow vulnerability was discovered in the SPNEGO
implementation affecting the GSSAPI security policy negotiation in BIND,
a DNS server implementation, which could result in denial of service
(daemon crash), or potentially the execution of arbitrary code.
'bind9' package(s) on Debian Linux.
For the stable distribution (buster), this problem has been fixed in
We recommend that you upgrade your bind9 packages.
Common Vulnerability Exposure (CVE) ID: CVE-2020-8625|
Debian Security Information: DSA-4857 (Google Search)
|Copyright||Copyright (C) 2021 Greenbone Networks GmbH|
|This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.