[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250363

 
 

909

 
 

196124

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-5504-1 bind9 -- bind9

ID: oval:org.secpod.oval:def:612676Date: (C)2023-10-20   (M)2024-04-25
Class: PATCHFamily: unix




Several vulnerabilities were discovered in BIND, a DNS server implementation. CVE-2023-3341 A stack exhaustion flaw was discovered in the control channel code which may result in denial of service . CVE-2023-4236 Robert Story discovered that a flaw in the networking code handling DNS-over-TLS queries could cause named to terminate unexpectedly due to an assertion failure, resulting in denial of service when under high DNS-over-TLS query load conditions.

Platform:
Debian 12.x
Debian 11.x
Product:
dnsutils
bind9
Reference:
DSA-5504-1
CVE-2023-3341
CVE-2023-4236
CVE    2
CVE-2023-4236
CVE-2023-3341
CPE    10
cpe:/a:isc:bind:9.11.29:s1:~~supported_preview~~~
cpe:/a:isc:bind:9.11.8:s1:~~supported_preview~~~
cpe:/a:isc:bind:9.9.3:s1:~~supported_preview~~~
cpe:/a:isc:bind:9.11.5:s6:~~supported_preview~~~
...

© SecPod Technologies