Download
| Alert*
oval:org.secpod.oval:def:2107530
Oracle Solaris 11 - ( CVE-2021-25220 ) oval:org.secpod.oval:def:2600018 The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. oval:org.secpod.oval:def:2500846 The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. oval:org.secpod.oval:def:4501043 The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. Security Fix: * bind: DNS forwarders - cache poisoning vulnerability * bind: DoS from s ... oval:org.secpod.oval:def:4501046 The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. Security Fix: * bind: DNS forwarders - cache poisoning vulnerability For more details a ... oval:org.secpod.oval:def:79865 bind9: Internet Domain Name Server Several security issues were fixed in Bind. oval:org.secpod.oval:def:1506189 [32:9.11.36-5] - Fix memory leak in ECDSA verify processing - Fix memory leak in EdDSA verify processing [32:9.11.36-4] - Tighten cache protection against record from forwarders - Include test of forwarders [32:9.11.36-2] - Reduce memory used per-view on machine with few processors [32:9.11.36-2 ... oval:org.secpod.oval:def:507506 The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. Security Fix: * bind: DNS forwarders - cache poisoning vulnerability * bind: processing ... oval:org.secpod.oval:def:89989 The remote host is missing a patch 153154-06 containing a security fix. For more information please visit the reference link. oval:org.secpod.oval:def:89046152 This update for bind fixes the following issues: - CVE-2021-25220: Fixed a DNS cache poisoning vulnerability due to loose caching rules . oval:org.secpod.oval:def:89988 The remote host is missing a patch 153153-06 containing a security fix. For more information please visit the reference link. oval:org.secpod.oval:def:121780 This package provides an LDAP back-end plug-in for BIND. It features support for dynamic updates and internal caching, to lift the load off of your LDAP server. oval:org.secpod.oval:def:3301006 SUSE Security Update: Security update for bind oval:org.secpod.oval:def:507310 The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. Security Fix: * bind: DNS forwarders - cache poisoning vulnerability For more details a ... oval:org.secpod.oval:def:79863 bind9: Internet Domain Name Server Several security issues were fixed in Bind. oval:org.secpod.oval:def:5800054 The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. Security Fix: * bind: DNS forwarders - cache poisoning vulnerability * bind: DoS from s ... oval:org.secpod.oval:def:121798 This package provides an LDAP back-end plug-in for BIND. It features support for dynamic updates and internal caching, to lift the load off of your LDAP server. oval:org.secpod.oval:def:121877 DHCP oval:org.secpod.oval:def:79858 Two vulnerabilities were found in the BIND DNS server, which could result in denial of service or cache poisoning. oval:org.secpod.oval:def:89047632 This update for bind fixes the following issues: - CVE-2021-25219: Fixed flaw that allowed abusing lame cache to severely degrade resolver performance . - CVE-2021-25220: Fixed potentially incorrect answers by cached forwarders . - CVE-2022-0396: Fixed a incorrect handling of TCP connection slots ti ... oval:org.secpod.oval:def:122087 DHCP oval:org.secpod.oval:def:5800124 The Dynamic Host Configuration Protocol is a protocol that allows individual devices on an IP network to get their own network configuration information, including an IP address, a subnet mask, and a broadcast address. The dhcp packages provide a relay agent and ISC DHCP service required to enable ... oval:org.secpod.oval:def:19500084 A cache poisoning vulnerability was found in BIND when using forwarders. Bogus NS records supplied by the forwarders may be cached and used by name if it needs to recurse for any reason. This issue causes it to obtain and pass on potentially incorrect answers. This flaw allows a remote attacker to m ... oval:org.secpod.oval:def:87151 [32:9.16.23-5] - Fix possible serve-stale related crash - Fix memory leak in ECDSA verify processing - Fix memory leak in EdDSA verify processing [32:9.16.23-4] - Export bind-doc package [32:9.16.23-3] - Tighten cache protection against record from forwarders - Include test of forwarders [32:9. ... oval:org.secpod.oval:def:78364 bind9: Internet Domain Name Server Several security issues were fixed in Bind. oval:org.secpod.oval:def:1506168 [32:9.16.23-0.9.1] - Fix possible serve-stale related crash - Fix memory leak in ECDSA verify processing - Fix memory leak in EdDSA verify processing [32:9.16.23-0.9] - Tighten cache protection against record from forwarders - Include test of forwarders [32:9.16.23-0.8] - TCP connections with ke ... oval:org.secpod.oval:def:1506367 [32:9.11.4-26.P2.13] - Tighten cache protection against record from forwarders [32:9.11.4-26.P2.12] - Include test of forwarders [32:9.11.4-26.P2.11] - Prevent excessive resource use while processing large delegations oval:org.secpod.oval:def:507404 The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. Security Fix: * bind: DNS forwarders - cache poisoning vulnerability * bind: DoS from s ... oval:org.secpod.oval:def:89047546 This update for bind fixes the following issues: - CVE-2021-25220: Fixed a DNS cache poisoning vulnerability due to loose caching rules . oval:org.secpod.oval:def:1506288 [12:4.4.2-17.b1] - omshell: add support for hmac-sha512 algorithm [12:4.4.2-16.b1] - Fix for CVE-2021-25220 oval:org.secpod.oval:def:1701241 A cache poisoning vulnerability was found in BIND when using forwarders. Bogus NS records supplied by the forwarders may be cached and used by name if it needs to recurse for any reason. This issue causes it to obtain and pass on potentially incorrect answers. This flaw allows a remote attacker to m ... oval:org.secpod.oval:def:89964 The remote host is missing a patch 119784-47 containing a security fix. For more information please visit the reference link. oval:org.secpod.oval:def:89960 The remote host is missing a patch 119783-49 containing a security fix. For more information please visit the reference link. oval:org.secpod.oval:def:3300896 SUSE Security Update: Security update for bind oval:org.secpod.oval:def:706355 bind9: Internet Domain Name Server Several security issues were fixed in Bind. oval:org.secpod.oval:def:121805 BIND is an implementation of the DNS protocols. BIND includes a DNS server , which resolves host names to IP addresses; a resolver library ; and tools for verifying that the DNS server is operating properly. oval:org.secpod.oval:def:2600000 The Dynamic Host Configuration Protocol is a protocol that allows individual devices on an IP network to get their own network configuration information, including an IP address, a subnet mask, and a broadcast address. The dhcp packages provide a relay agent and ISC DHCP service required to enable ... oval:org.secpod.oval:def:206002 Security Fix: bind: DNS forwarders - cache poisoning vulnerability bind: processing large delegations may severely degrade resolver performance For more details about the security issue, including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page liste ... oval:org.secpod.oval:def:507379 The Dynamic Host Configuration Protocol is a protocol that allows individual devices on an IP network to get their own network configuration information, including an IP address, a subnet mask, and a broadcast address. The dhcp packages provide a relay agent and ISC DHCP service required to enable ... oval:org.secpod.oval:def:507337 The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. Security Fix: * bind: DNS forwarders - cache poisoning vulnerability * bind: DoS from s ... oval:org.secpod.oval:def:121779 BIND is an implementation of the DNS protocols. BIND includes a DNS server , which resolves host names to IP addresses; a resolver library ; and tools for verifying that the DNS server is operating properly. oval:org.secpod.oval:def:2500863 The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. oval:org.secpod.oval:def:89046364 This update for bind fixes the following issues: - CVE-2021-25220: Fixed potentially incorrect answers by cached forwarders . oval:org.secpod.oval:def:86367 The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. Security Fix: * bind: DNS forwarders - cache poisoning vulnerability For more details a ... oval:org.secpod.oval:def:3301274 SUSE Security Update: Security update for bind oval:org.secpod.oval:def:606183 Two vulnerabilities were found in the BIND DNS server, which could result in denial of service or cache poisoning. oval:org.secpod.oval:def:89046161 This update for bind fixes the following issues: - CVE-2021-25220: Fixed a DNS cache poisoning vulnerability due to loose caching rules . oval:org.secpod.oval:def:86368 The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. Security Fix: * bind: DNS forwarders - cache poisoning vulnerability * bind: DoS from s ... oval:org.secpod.oval:def:97616 [CLSA-2022:1649331579] Fixed CVE-2021-25220 in bind oval:org.secpod.oval:def:90220 The remote host is missing a patch containing a security fix, which affects the following packages: bos.net.tcp.server, bos.net.tcp.bind_utils, bos.net.tcp.client and bos.net.tcp.bind. For more information please visit vendor advisory link. |