[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

244411

 
 

909

 
 

193363

 
 

277

Paid content will be excluded from the download.


Download | Alert*
OVAL

Bind - (bulletinjan2018)

ID: oval:org.secpod.oval:def:2101627Date: (C)2019-12-30   (M)2022-10-10
Class: PATCHFamily: unix




An attacker who is able to send and receive messages to an authoritative DNS server and who has knowledge of a valid TSIG key name for the zone and service being targeted may be able to manipulate BIND into accepting an unauthorized dynamic update. Affects BIND 9.4.0->9.8.8, 9.9.0->9.9.10-P1, 9.10.0->9.10.5-P1, 9.11.0->9.11.1-P1, 9.9.3-S1->9.9.10-S2, 9.10.5-S1->9.10.5-S2.

Platform:
Sun Solaris 11
Product:
service/network/dns/bind
network/dns/bind
Reference:
bulletinjan2018
CVE-2017-3143
CVE-2017-3142
CVE    2
CVE-2017-3143
CVE-2017-3142
CPE    1
cpe:/o:oracle:solaris:11

© SecPod Technologies