Download
| Alert*
oval:org.secpod.oval:def:126293
This package provides an LDAP back-end plug-in for BIND. It features support for dynamic updates and internal caching, to lift the load off of your LDAP server. oval:org.secpod.oval:def:126195 This package provides an LDAP back-end plug-in for BIND. It features support for dynamic updates and internal caching, to lift the load off of your LDAP server. oval:org.secpod.oval:def:508097 The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. Security Fix: bind: stack exhaustion in control channel code may lead to DoS For more d ... oval:org.secpod.oval:def:126196 BIND is an implementation of the DNS protocols. BIND includes a DNS server , which resolves host names to IP addresses; a resolver library ; and tools for verifying that the DNS server is operating properly. oval:org.secpod.oval:def:95213 Several vulnerabilities were discovered in BIND, a DNS server implementation. CVE-2023-3341 A stack exhaustion flaw was discovered in the control channel code which may result in denial of service . CVE-2023-4236 Robert Story discovered that a flaw in the networking code handling DNS-over-TLS querie ... oval:org.secpod.oval:def:1701818 The code that processes control channel messages sent to `named` calls certain functions recursively during packet parsing. Recursion depth is only limited by the maximum accepted packet size; depending on the environment, this may cause the packet-parsing code to run out of available stack memory, ... oval:org.secpod.oval:def:1507051 [32:9.16.23-14.2] - stack exhaustion in control channel code may lead to DoS oval:org.secpod.oval:def:97756 [CLSA-2023:1697136232] bind: Fix of CVE-2023-3341 oval:org.secpod.oval:def:507985 The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. Security Fix: * bind: stack exhaustion in control channel code may lead to DoS For more ... oval:org.secpod.oval:def:1507072 [32:9.16.23-11.2] - stack exhaustion in control channel code may lead to DoS oval:org.secpod.oval:def:1507050 [32:9.11.36-8.2] - stack exhaustion in control channel code may lead to DoS oval:org.secpod.oval:def:507989 The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. Security Fix: * bind: stack exhaustion in control channel code may lead to DoS For more ... oval:org.secpod.oval:def:2501189 The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. oval:org.secpod.oval:def:89049821 This update for bind fixes the following issues: Security fixes: * CVE-2023-3341: Fixed stack exhaustion flaw in control channel code may cause named to terminate unexpectedly . Other fixes: * Add `dnstap` support oval:org.secpod.oval:def:206039 Security Fix: bind: stack exhaustion in control channel code may lead to DoS For more details about the security issue, including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page listed in the References section. oval:org.secpod.oval:def:19500419 The code that processes control channel messages sent to 'named' calls certain functions recursively during packet parsing. Recursion depth is only limited by the maximum accepted packet size; depending on the environment, this may cause the packet-parsing code to run out of available stack memory, ... oval:org.secpod.oval:def:89049587 This update for bind fixes the following issues: Update to release 9.16.44: * CVE-2023-3341: Fixed stack exhaustion flaw in control channel code may cause named to terminate unexpectedly . Update to release 9.16.43 * Processing already-queued queries received over TCP could cause an assertion failur ... oval:org.secpod.oval:def:3302057 Security update for bind oval:org.secpod.oval:def:89049583 This update for bind fixes the following issues: * CVE-2023-3341: Fixed stack exhaustion flaw in control channel code may cause named to terminate unexpectedly . oval:org.secpod.oval:def:708457 bind9: Internet Domain Name Server Bind could be made to crash if it received specially crafted network traffic. oval:org.secpod.oval:def:2600342 The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. oval:org.secpod.oval:def:96919 The remote host is missing a patch containing a security fix, which affects the following packages: bind.rte, bos.net.tcp.bind_utils, and bos.net.tcp.bind. For more information please visit vendor advisory link. oval:org.secpod.oval:def:2501190 The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. oval:org.secpod.oval:def:2108294 Oracle Solaris 11 - ( CVE-2023-3341 ) oval:org.secpod.oval:def:93582 bind9: Internet Domain Name Server Bind could be made to crash if it received specially crafted network traffic. oval:org.secpod.oval:def:95023 bind9: Internet Domain Name Server Bind could be made to crash if it received specially crafted network traffic. oval:org.secpod.oval:def:97268 The remote host is missing a patch 119784-51 containing a security fix. For more information please visit the reference link. oval:org.secpod.oval:def:97269 The remote host is missing a patch 119783-51 containing a security fix. For more information please visit the reference link. oval:org.secpod.oval:def:508201 The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. Security Fix: bind: stack exhaustion in control channel code may lead to DoS For more d ... oval:org.secpod.oval:def:89049418 This update for bind fixes the following issues: Update to release 9.16.44: * CVE-2023-3341: Fixed stack exhaustion flaw in control channel code may cause named to terminate unexpectedly . oval:org.secpod.oval:def:1507066 [32:9.11.4-26.P2.15] - Limit the amount of recursion possible in control channel oval:org.secpod.oval:def:1601816 The code that processes control channel messages sent to `named` calls certain functions recursively during packet parsing. Recursion depth is only limited by the maximum accepted packet size; depending on the environment, this may cause the packet-parsing code to run out of available stack memory, ... oval:org.secpod.oval:def:126726 BIND is an implementation of the DNS protocols. BIND includes a DNS server , which resolves host names to IP addresses; a resolver library ; and tools for verifying that the DNS server is operating properly. oval:org.secpod.oval:def:612676 Several vulnerabilities were discovered in BIND, a DNS server implementation. CVE-2023-3341 A stack exhaustion flaw was discovered in the control channel code which may result in denial of service . CVE-2023-4236 Robert Story discovered that a flaw in the networking code handling DNS-over-TLS querie ... oval:org.secpod.oval:def:5800206 The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. Security Fix: * bind: stack exhaustion in control channel code may lead to DoS For more ... oval:org.secpod.oval:def:3301873 Security update for bind oval:org.secpod.oval:def:3302006 Security update for bind oval:org.secpod.oval:def:126287 BIND is an implementation of the DNS protocols. BIND includes a DNS server , which resolves host names to IP addresses; a resolver library ; and tools for verifying that the DNS server is operating properly. oval:org.secpod.oval:def:1507461 [32:9.16.23-0.16.2] - Prevent crashing at masterformat system test [32:9.16.23-0.16.1] - Prevent increased CPU load on large DNS messages - Prevent assertion failure when nxdomain-redirect is used with RFC 1918 reverse zones - Prevent assertion failure if DNS64 and serve-stale is used - Specific ... |