Download
| Alert*
oval:org.secpod.oval:def:64144
Several vulnerabilities were discovered in BIND, a DNS server implementation. CVE-2019-6477 It was discovered that TCP-pipelined queries can bypass tcp-client limits resulting in denial of service. CVE-2020-8616 It was discovered that BIND does not sufficiently limit the number of fetches performed ... oval:org.secpod.oval:def:66553 The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. Security Fix: * bind: BIND does not sufficiently limit the number of fetches performed w ... oval:org.secpod.oval:def:64116 bind9: Internet Domain Name Server Several security issues were fixed in Bind. oval:org.secpod.oval:def:89002989 This update for bind fixes the following issues: Security issues fixed: - CVE-2020-8616: Fixed the insufficient limit on the number of fetches performed when processing referrals . - CVE-2020-8617: Fixed a logic error in code which checks TSIG validity . Non-security issue fixed: - Fixed an invalid ... oval:org.secpod.oval:def:503757 The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. Security Fix: * bind: BIND does not sufficiently limit the number of fetches performed w ... oval:org.secpod.oval:def:503761 The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. Security Fix: * bind: BIND does not sufficiently limit the number of fetches performed w ... oval:org.secpod.oval:def:503763 The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. Security Fix: * bind: BIND does not sufficiently limit the number of fetches performed w ... oval:org.secpod.oval:def:1601133 A malicious actor who intentionally exploits this lack of effective limitation on the number of fetches performed when processing referrals can, through the use of specially crafted referrals, cause a recursing server to issue a very large number of fetches in an attempt to process the referral. Thi ... oval:org.secpod.oval:def:1000866 The remote host is missing a patch 119783-45 containing a security fix. For more information please visit the reference link. oval:org.secpod.oval:def:118308 This is dnsperf, a collection of DNS server performance testing tools. For more information, see the dnsperf and resperf man pages. oval:org.secpod.oval:def:118307 BIND is an implementation of the DNS protocols. BIND includes a DNS server , which resolves host names to IP addresses; a resolver library ; and tools for verifying that the DNS server is operating properly. oval:org.secpod.oval:def:118303 This package provides an LDAP back-end plug-in for BIND. It features support for dynamic updates and internal caching, to lift the load off of your LDAP server. oval:org.secpod.oval:def:1000859 The remote host is missing a patch 119784-45 containing a security fix. For more information please visit the reference link. oval:org.secpod.oval:def:118292 BIND is an implementation of the DNS protocols. BIND includes a DNS server , which resolves host names to IP addresses; a resolver library ; and tools for verifying that the DNS server is operating properly. oval:org.secpod.oval:def:89000380 This update for bind fixes the following issues: - CVE-2020-8616: Fixed the insufficient limit on the number of fetches performed when processing referrals . - CVE-2020-8617: Fixed a logic error in code which checks TSIG validity . - CVE-2018-5741: Fixed the documentation . - Removed rndc.key genera ... oval:org.secpod.oval:def:89000322 This update for bind fixes the following issues: - Amended documentation referring to rule types quot;krb5-subdomainquot; and quot;ms-subdomainquot;. This incorrect documentation could mislead operators into believing that policies they had configured were more restrictive than they actually were. [ ... oval:org.secpod.oval:def:604853 Several vulnerabilities were discovered in BIND, a DNS server implementation. CVE-2019-6477 It was discovered that TCP-pipelined queries can bypass tcp-client limits resulting in denial of service. CVE-2020-8616 It was discovered that BIND does not sufficiently limit the number of fetches performed ... oval:org.secpod.oval:def:1700337 An assertion failure was found in BIND, which checks the validity of messages containing TSIG resource records. This flaw allows an attacker that knows or successfully guesses the name of the TSIG key used by the server to use a specially-crafted message, potentially causing a BIND server to reach a ... oval:org.secpod.oval:def:205571 The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. Security Fix: * bind: BIND does not sufficiently limit the number of fetches performed w ... oval:org.secpod.oval:def:705480 bind9: Internet Domain Name Server Several security issues were fixed in Bind. oval:org.secpod.oval:def:205574 The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. Security Fix: * bind: BIND does not sufficiently limit the number of fetches performed w ... oval:org.secpod.oval:def:1502918 The advisory is missing the security advisory description. For more information please visit the reference link oval:org.secpod.oval:def:1502920 The advisory is missing the security advisory description. For more information please visit the reference link oval:org.secpod.oval:def:1502926 The advisory is missing the security advisory description. For more information please visit the reference link oval:org.secpod.oval:def:89002979 This update for bind fixes the following issues: BIND was upgraded to version 9.16.6: Note: - bind is now more strict in regards to DNSSEC. If queries are not working, check for DNSSEC issues. For instance, if bind is used in a namserver forwarder chain, the forwarding DNS servers must support DNSSE ... oval:org.secpod.oval:def:1100547 The remote host is missing a patch containing a security fix, which affects the following packages: bos.net.tcp.client. For more information please visit vendor advisory link. |