[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

244411

 
 

909

 
 

193363

 
 

277

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-3319-1 bind9 -- bind9

ID: oval:org.secpod.oval:def:602179Date: (C)2015-08-27   (M)2023-12-07
Class: PATCHFamily: unix




Jonathan Foote discovered that the BIND DNS server does not properly handle TKEY queries. A remote attacker can take advantage of this flaw to mount a denial of service via a specially crafted query triggering an assertion failure and causing BIND to exit.

Platform:
Debian 8.x
Debian 7.x
Product:
bind9
Reference:
DSA-3319-1
CVE-2015-5477
CVE    1
CVE-2015-5477
CPE    3
cpe:/a:isc:bind9
cpe:/o:debian:debian_linux:7.x
cpe:/o:debian:debian_linux:8.x

© SecPod Technologies