[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

256148

 
 

909

 
 

199106

 
 

282

Paid content will be excluded from the download.


Download | Alert*


oval:org.secpod.oval:def:503610
The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. Security Fix: * bind: TCP Pipelining doesn"t limit TCP clients on a single connection * ...

oval:org.secpod.oval:def:64144
Several vulnerabilities were discovered in BIND, a DNS server implementation. CVE-2019-6477 It was discovered that TCP-pipelined queries can bypass tcp-client limits resulting in denial of service. CVE-2020-8616 It was discovered that BIND does not sufficiently limit the number of fetches performed ...

oval:org.secpod.oval:def:66806
The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. The following packages have been upgraded to a later upstream version: bind . Security ...

oval:org.secpod.oval:def:60792
bind9: Internet Domain Name Server Bind could be made to consume resources if it received specially crafted network traffic.

oval:org.secpod.oval:def:117598
This is dnsperf, a collection of DNS server performance testing tools. For more information, see the dnsperf and resperf man pages.

oval:org.secpod.oval:def:117533
BIND is an implementation of the DNS protocols. BIND includes a DNS server , which resolves host names to IP addresses; a resolver library ; and tools for verifying that the DNS server is operating properly.

oval:org.secpod.oval:def:117599
This package provides an LDAP back-end plug-in for BIND. It features support for dynamic updates and internal caching, to lift the load off of your LDAP server.

oval:org.secpod.oval:def:117530
This package provides an LDAP back-end plug-in for BIND. It features support for dynamic updates and internal caching, to lift the load off of your LDAP server.

oval:org.secpod.oval:def:1802066
By design, BIND is intended to limit the number of TCP clients that can be connected at any given time. The update to this functionality introduced by CVE-2018-5743 changed how BIND calculates the number of concurrent TCP clients from counting the outstanding TCP queries to counting the TCP client c ...

oval:org.secpod.oval:def:117529
This is dnsperf, a collection of DNS server performance testing tools. For more information, see the dnsperf and resperf man pages.

oval:org.secpod.oval:def:117600
BIND is an implementation of the DNS protocols. BIND includes a DNS server , which resolves host names to IP addresses; a resolver library ; and tools for verifying that the DNS server is operating properly.

oval:org.secpod.oval:def:604853
Several vulnerabilities were discovered in BIND, a DNS server implementation. CVE-2019-6477 It was discovered that TCP-pipelined queries can bypass tcp-client limits resulting in denial of service. CVE-2020-8616 It was discovered that BIND does not sufficiently limit the number of fetches performed ...

oval:org.secpod.oval:def:705289
bind9: Internet Domain Name Server Bind could be made to consume resources if it received specially crafted network traffic.

oval:org.secpod.oval:def:1504410
[32:9.11.13-3] - Fix rwlock to be thread-safe [32:9.11.13-2] - Release GeoIP data on reload [32:9.11.13-1] - Update to 9.11.13 [32:9.11.12-5] - Report failures on systemctl reload [32:9.11.12-4] - dhcp: Use monotonic time for detecting time jumps if available [32:9.11.12-3] - Backported serve-st ...

oval:org.secpod.oval:def:69521
The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. The following packages have been upgraded to a later upstream version: bind . Security ...

oval:org.secpod.oval:def:1700350
"managed-keys" is a feature which allows a BIND resolver to automatically maintain the keys used by trust anchors which operators configure for use in DNSSEC validation. Due to an error in the managed-keys feature it is possible for a BIND server which uses managed-keys to exit due to an assertion f ...

oval:org.secpod.oval:def:205535
The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. Security Fix: * bind: TCP Pipelining doesn"t limit TCP clients on a single connection * ...

oval:org.secpod.oval:def:1504378
[32:9.11.4-16.P2] - Finish dig query when name is too long [32:9.11.4-15.P2] - Stop listening on IPv6 by default [32:9.11.4-14.P2] - Limit number of queries per TCP connection [32:9.11.4-13.P2] - Revert not searching names with dot [32:9.11.4-12.P2] - Fix mkeys test validating CVE-2018-5745 fix ...

oval:org.secpod.oval:def:90257
The remote host is missing a patch 119783-44 containing a security fix. For more information please visit the reference link.

oval:org.secpod.oval:def:90258
The remote host is missing a patch 119784-44 containing a security fix. For more information please visit the reference link.

oval:org.secpod.oval:def:89002979
This update for bind fixes the following issues: BIND was upgraded to version 9.16.6: Note: - bind is now more strict in regards to DNSSEC. If queries are not working, check for DNSSEC issues. For instance, if bind is used in a namserver forwarder chain, the forwarding DNS servers must support DNSSE ...

CPE    3
cpe:/a:isc:bind
cpe:/a:isc:bind:9.11.5:s6:~~supported_preview~~~
cpe:/a:isc:bind:9.11.6:p1
CWE    1
CWE-400
*CVE
CVE-2019-6477

© SecPod Technologies