[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255227

 
 

909

 
 

198741

 
 

282

Paid content will be excluded from the download.


Download | Alert*


oval:org.secpod.oval:def:102188
BIND is an implementation of the DNS protocols. BIND includes a DNS server , which resolves host names to IP addresses; a resolver library ; and tools for verifying that the DNS server is operating properly.

oval:org.secpod.oval:def:2630
The host is missing an important security update according to Microsoft bulletin, MS08-037. The update is required to fix a security bypass vulnerability. The flaws are present in the DNS client and DNS server, which fail to prevent spoofing. Successful exploitation could allow attackers to redirect ...

oval:org.mitre.oval:def:5725
The DNS protocol, as implemented in (1) BIND 8 and 9 before 9.5.0-P1, 9.4.2-P1, and 9.3.5-P1; (2) Microsoft DNS in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2; and other implementations allow remote attackers to spoof DNS traffic via a birthday attack that uses in-bailiwick referra ...

oval:org.mitre.oval:def:7531
Dan Kaminsky discovered that properties inherent to the DNS protocol lead to practical DNS cache poisoning attacks. Among other things, successful attacks can lead to misdirected web traffic and email rerouting. This update changes Debian's dnsmasq packages to implement the recommended countermeasur ...

oval:org.mitre.oval:def:8092
Dan Kaminsky discovered that properties inherent to the DNS protocol lead to practical DNS cache poisoning attacks. Among other things, successful attacks can lead to misdirected web traffic and email rerouting. This update changes Debian's BIND 9 packages to implement the recommended countermeasure ...

oval:org.mitre.oval:def:7753
Multiple weaknesses have been identified in PyDNS, a DNS client implementation for the Python language. Dan Kaminsky identified a practical vector of DNS response spoofing and cache poisoning, exploiting the limited entropy in a DNS transaction ID and lack of UDP source port randomization in many DN ...

oval:org.secpod.oval:def:101512
Dnsmasq is lightweight, easy to configure DNS forwarder and DHCP server. It is designed to provide DNS and, optionally, DHCP, to a small network. It can serve the names of local machines which are not in the global DNS. The DHCP server integrates with the DNS server and allows machines with DHCP-all ...

oval:org.secpod.oval:def:301658
A weakness was found in the DNS protocol by Dan Kaminsky. A remote attacker could exploit this weakness to spoof DNS entries and poison DNS caches. This could be used to misdirect users and services; i.e. for web and email traffic . This update provides the latest stable BIND releases for all platfo ...

oval:org.mitre.oval:def:7660
In DSA-1603-1, Debian released an update to the BIND 9 domain name server, which introduced UDP source port randomization to mitigate the threat of DNS cache poisoning attacks (identified by the Common Vulnerabilities and Exposures project as CVE-2008-1447). The fix, while correct, was incompatible ...

oval:org.secpod.oval:def:1000711
The remote host is missing a patch 152078-81 containing a security fix. For more information please visit the reference link.

oval:org.secpod.oval:def:1000755
The remote host is missing a patch 152096-71 containing a security fix. For more information please visit the reference link.

oval:org.secpod.oval:def:1000673
The remote host is missing a patch 152099-71 containing a security fix. For more information please visit the reference link.

oval:org.secpod.oval:def:1000628
The remote host is missing a patch 152077-81 containing a security fix. For more information please visit the reference link.

oval:org.secpod.oval:def:1000700
The remote host is missing a patch 152076-81 containing a security fix. For more information please visit the reference link.

oval:org.secpod.oval:def:1000702
The remote host is missing a patch 152100-61 containing a security fix. For more information please visit the reference link.

oval:org.secpod.oval:def:1000626
The remote host is missing a patch 152079-81 containing a security fix. For more information please visit the reference link.

oval:org.secpod.oval:def:1000686
The remote host is missing a patch 152101-61 containing a security fix. For more information please visit the reference link.

oval:org.secpod.oval:def:1000801
The remote host is missing a patch 152098-71 containing a security fix. For more information please visit the reference link.

oval:org.secpod.oval:def:1000726
The remote host is missing a patch 152097-71 containing a security fix. For more information please visit the reference link.

CPE    18
cpe:/a:isc:bind:4
cpe:/o:canonical:ubuntu_linux:7.04
cpe:/o:redhat:enterprise_linux:2.1::ws
cpe:/o:cisco:ios:12.0
...
CWE    1
CWE-331
*CVE
CVE-2008-1447

© SecPod Technologies