Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:
Category:Huawei EulerOS Local Security Checks
Title:Huawei EulerOS: Security Advisory for bind (EulerOS-SA-2021-1396)
Summary:The remote host is missing an update for the Huawei EulerOS 'bind' package(s) announced via the EulerOS-SA-2021-1396 advisory.
The remote host is missing an update for the Huawei EulerOS 'bind' package(s) announced via the EulerOS-SA-2021-1396 advisory.

Vulnerability Insight:
A buffer overflow flaw was found in the SPNEGO implementation used by BIND. This flaw allows a remote attacker to cause the named process to crash or possibly perform remote code execution. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.(CVE-2020-8625)

named in ISC BIND 9.9.9-P4, 9.9.9-S6, 9.10.4-P4, and 9.11.0-P1 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a response containing an inconsistency among the DNSSEC-related RRsets.(CVE-2016-9147)

Under some conditions when using both DNS64 and RPZ to rewrite query responses, query processing can resume in an inconsistent state leading to either an INSIST assertion failure or an attempt to read through a NULL pointer. Affects BIND 9.8.8, 9.9.3-S1 -> 9.9.9-S7, 9.9.3 -> 9.9.9-P5, 9.9.10b1, 9.10.0 -> 9.10.4-P5, 9.10.5b1, 9.11.0 -> 9.11.0-P2, 9.11.1b1.(CVE-2017-3135)

Mistaken assumptions about the ordering of records in the answer section of a response containing CNAME or DNAME resource records could lead to a situation in which named would exit with an assertion failure when processing a response in which records occurred in an unusual order. Affects BIND 9.9.9-P6, 9.9.10b1->9.9.10rc1, 9.10.4-P6, 9.10.5b1->9.10.5rc1, 9.11.0-P3, 9.11.1b1->9.11.1rc1, and 9.9.9-S8.(CVE-2017-3137)

apl_42.c in ISC BIND 9.x before 9.9.8-P3, 9.9.x, and 9.10.x before 9.10.3-P3 allows remote authenticated users to cause a denial of service (INSIST assertion failure and daemon exit) via a malformed Address Prefix List (APL) record.(CVE-2015-8704)

named in ISC BIND 9.x before 9.9.9-P5, 9.10.x before 9.10.4-P5, and 9.11.x before 9.11.0-P2 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a crafted DS resource record in an answer.(CVE-2016-9444)

Affected Software/OS:
'bind' package(s) on Huawei EulerOS Virtualization for ARM 64

Please install the updated package(s).

CVSS Score:

CVSS Vector:

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2015-8704
BugTraq ID: 81329
Debian Security Information: DSA-3449 (Google Search)
FreeBSD Security Advisory: FreeBSD-SA-16:08
HPdes Security Advisory: HPSBUX03552
HPdes Security Advisory: SSRT102983
RedHat Security Advisories: RHSA-2016:0073
RedHat Security Advisories: RHSA-2016:0074
SuSE Security Announcement: SUSE-SU-2016:0174 (Google Search)
SuSE Security Announcement: SUSE-SU-2016:0180 (Google Search)
SuSE Security Announcement: SUSE-SU-2016:0200 (Google Search)
SuSE Security Announcement: SUSE-SU-2016:0227 (Google Search)
SuSE Security Announcement: openSUSE-SU-2016:0197 (Google Search)
SuSE Security Announcement: openSUSE-SU-2016:0199 (Google Search)
SuSE Security Announcement: openSUSE-SU-2016:0204 (Google Search)
Common Vulnerability Exposure (CVE) ID: CVE-2016-9147
BugTraq ID: 95390
Debian Security Information: DSA-3758 (Google Search)
RedHat Security Advisories: RHSA-2017:0062
RedHat Security Advisories: RHSA-2017:0063
RedHat Security Advisories: RHSA-2017:0064
RedHat Security Advisories: RHSA-2017:1582
RedHat Security Advisories: RHSA-2017:1583
Common Vulnerability Exposure (CVE) ID: CVE-2016-9444
BugTraq ID: 95393
Common Vulnerability Exposure (CVE) ID: CVE-2017-3135
BugTraq ID: 96150
Debian Security Information: DSA-3795 (Google Search)
RedHat Security Advisories: RHSA-2017:0276
Common Vulnerability Exposure (CVE) ID: CVE-2017-3137
BugTraq ID: 97651
Debian Security Information: DSA-3854 (Google Search)
RedHat Security Advisories: RHSA-2017:1095
RedHat Security Advisories: RHSA-2017:1105
Common Vulnerability Exposure (CVE) ID: CVE-2020-8625
Debian Security Information: DSA-4857 (Google Search)
CopyrightCopyright (C) 2021 Greenbone Networks GmbH

This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

© 1998-2022 E-Soft Inc. All rights reserved.