ALT-PU-2015-1641-1
Closed vulnerabilities
BDU:2015-12237
Уязвимость сервера DNS BIND, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2016-00941
Уязвимость сервера DNS BIND, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2016-00942
Уязвимость сервера DNS BIND, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2014-8500
ISC BIND 9.0.x through 9.8.x, 9.9.0 through 9.9.6, and 9.10.0 through 9.10.1 does not limit delegation chaining, which allows remote attackers to cause a denial of service (memory consumption and named crash) via a large or infinite number of referrals.
- http://advisories.mageia.org/MGASA-2014-0524.html
- http://advisories.mageia.org/MGASA-2014-0524.html
- http://cert.ssi.gouv.fr/site/CERTFR-2014-AVI-512/index.html
- http://cert.ssi.gouv.fr/site/CERTFR-2014-AVI-512/index.html
- NetBSD-SA2015-002
- NetBSD-SA2015-002
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10676
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10676
- APPLE-SA-2015-09-16-4
- APPLE-SA-2015-09-16-4
- SUSE-SU-2015:0011
- SUSE-SU-2015:0011
- SUSE-SU-2015:0096
- SUSE-SU-2015:0096
- SUSE-SU-2015:0480
- SUSE-SU-2015:0480
- SUSE-SU-2015:0488
- SUSE-SU-2015:0488
- openSUSE-SU-2015:1250
- openSUSE-SU-2015:1250
- HPSBUX03235
- HPSBUX03235
- SSRT101750
- SSRT101750
- HPSBUX03400
- HPSBUX03400
- SSRT102211
- SSRT102211
- RHSA-2016:0078
- RHSA-2016:0078
- 62064
- 62064
- 62122
- 62122
- GLSA-201502-03
- GLSA-201502-03
- 1031311
- 1031311
- USN-2437-1
- USN-2437-1
- DSA-3094
- DSA-3094
- VU#264212
- VU#264212
- MDVSA-2015:165
- MDVSA-2015:165
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- 71590
- 71590
- https://kb.isc.org/article/AA-01216/
- https://kb.isc.org/article/AA-01216/
- https://security.netapp.com/advisory/ntap-20190730-0002/
- https://security.netapp.com/advisory/ntap-20190730-0002/
- https://support.apple.com/HT205219
- https://support.apple.com/HT205219
Modified: 2024-11-21
CVE-2015-1349
named in ISC BIND 9.7.0 through 9.9.6 before 9.9.6-P2 and 9.10.x before 9.10.1-P2, when DNSSEC validation and the managed-keys feature are enabled, allows remote attackers to cause a denial of service (assertion failure and daemon exit, or daemon crash) by triggering an incorrect trust-anchor management scenario in which no key is ready for use.
- http://advisories.mageia.org/MGASA-2015-0082.html
- http://advisories.mageia.org/MGASA-2015-0082.html
- APPLE-SA-2015-09-16-4
- APPLE-SA-2015-09-16-4
- FEDORA-2015-2543
- FEDORA-2015-2543
- FEDORA-2015-2548
- FEDORA-2015-2548
- SUSE-SU-2015:1205
- SUSE-SU-2015:1205
- openSUSE-SU-2015:1326
- openSUSE-SU-2015:1326
- openSUSE-SU-2015:1250
- openSUSE-SU-2015:1250
- HPSBUX03379
- HPSBUX03379
- SSRT101976
- SSRT101976
- RHSA-2015:0672
- RHSA-2015:0672
- MDVSA-2015:054
- MDVSA-2015:054
- MDVSA-2015:165
- MDVSA-2015:165
- USN-2503-1
- USN-2503-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1193820
- https://bugzilla.redhat.com/show_bug.cgi?id=1193820
- https://kb.isc.org/article/AA-01235
- https://kb.isc.org/article/AA-01235
- https://kb.juniper.net/JSA10783
- https://kb.juniper.net/JSA10783
- https://kc.mcafee.com/corporate/index?page=content&id=SB10116
- https://kc.mcafee.com/corporate/index?page=content&id=SB10116
- GLSA-201510-01
- GLSA-201510-01
- https://support.apple.com/HT205219
- https://support.apple.com/HT205219
Modified: 2024-11-21
CVE-2015-4620
name.c in named in ISC BIND 9.7.x through 9.9.x before 9.9.7-P1 and 9.10.x before 9.10.2-P2, when configured as a recursive resolver with DNSSEC validation, allows remote attackers to cause a denial of service (REQUIRE assertion failure and daemon exit) by constructing crafted zone data and then making a query for a name in that zone.
- FEDORA-2015-11483
- FEDORA-2015-11483
- FEDORA-2015-11484
- FEDORA-2015-11484
- SUSE-SU-2015:1205
- SUSE-SU-2015:1205
- openSUSE-SU-2015:1326
- openSUSE-SU-2015:1326
- openSUSE-SU-2015:1250
- openSUSE-SU-2015:1250
- HPSBUX03379
- HPSBUX03379
- SSRT101976
- SSRT101976
- RHSA-2015:1443
- RHSA-2015:1443
- RHSA-2015:1471
- RHSA-2015:1471
- DSA-3304
- DSA-3304
- 75588
- 75588
- 1032799
- 1032799
- USN-2669-1
- USN-2669-1
- https://kb.isc.org/article/AA-01267
- https://kb.isc.org/article/AA-01267
- https://kb.isc.org/article/AA-01305
- https://kb.isc.org/article/AA-01305
- https://kb.isc.org/article/AA-01306
- https://kb.isc.org/article/AA-01306
- https://kb.isc.org/article/AA-01307
- https://kb.isc.org/article/AA-01307
- https://kb.isc.org/article/AA-01438
- https://kb.isc.org/article/AA-01438
- https://kb.juniper.net/JSA10783
- https://kb.juniper.net/JSA10783
- https://kc.mcafee.com/corporate/index?page=content&id=SB10124
- https://kc.mcafee.com/corporate/index?page=content&id=SB10124
- GLSA-201510-01
- GLSA-201510-01
- https://security.netapp.com/advisory/ntap-20190903-0003/
- https://security.netapp.com/advisory/ntap-20190903-0003/
Modified: 2024-11-21
CVE-2015-5477
named in ISC BIND 9.x before 9.9.7-P2 and 9.10.x before 9.10.2-P3 allows remote attackers to cause a denial of service (REQUIRE assertion failure and daemon exit) via TKEY queries.
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10718
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10718
- FEDORA-2015-12335
- FEDORA-2015-12335
- FEDORA-2015-12357
- FEDORA-2015-12357
- FEDORA-2015-12316
- FEDORA-2015-12316
- SUSE-SU-2015:1304
- SUSE-SU-2015:1304
- SUSE-SU-2015:1305
- SUSE-SU-2015:1305
- SUSE-SU-2015:1316
- SUSE-SU-2015:1316
- SUSE-SU-2015:1322
- SUSE-SU-2015:1322
- openSUSE-SU-2015:1326
- openSUSE-SU-2015:1326
- openSUSE-SU-2015:1335
- openSUSE-SU-2015:1335
- SUSE-SU-2016:0227
- SUSE-SU-2016:0227
- HPSBUX03400
- HPSBUX03400
- SSRT102211
- SSRT102211
- HPSBUX03410
- HPSBUX03410
- SSRT102175
- SSRT102175
- HPSBOV03506
- HPSBOV03506
- HPSBUX03511
- HPSBUX03511
- SSRT102248
- SSRT102248
- http://packetstormsecurity.com/files/132926/BIND-TKEY-Query-Denial-Of-Service.html
- http://packetstormsecurity.com/files/132926/BIND-TKEY-Query-Denial-Of-Service.html
- RHSA-2015:1513
- RHSA-2015:1513
- RHSA-2015:1514
- RHSA-2015:1514
- RHSA-2015:1515
- RHSA-2015:1515
- RHSA-2016:0078
- RHSA-2016:0078
- RHSA-2016:0079
- RHSA-2016:0079
- DSA-3319
- DSA-3319
- http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- 76092
- 76092
- 1033100
- 1033100
- USN-2693-1
- USN-2693-1
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04789415
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04789415
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04952480
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04952480
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05095918
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05095918
- https://kb.isc.org/article/AA-01272
- https://kb.isc.org/article/AA-01272
- https://kb.isc.org/article/AA-01305
- https://kb.isc.org/article/AA-01305
- https://kb.isc.org/article/AA-01306
- https://kb.isc.org/article/AA-01306
- https://kb.isc.org/article/AA-01307
- https://kb.isc.org/article/AA-01307
- https://kb.isc.org/article/AA-01438
- https://kb.isc.org/article/AA-01438
- https://kb.juniper.net/JSA10783
- https://kb.juniper.net/JSA10783
- https://kc.mcafee.com/corporate/index?page=content&id=SB10126
- https://kc.mcafee.com/corporate/index?page=content&id=SB10126
- GLSA-201510-01
- GLSA-201510-01
- https://security.netapp.com/advisory/ntap-20160114-0001/
- https://security.netapp.com/advisory/ntap-20160114-0001/
- https://support.apple.com/kb/HT205032
- https://support.apple.com/kb/HT205032
- 37721
- 37721
- 37723
- 37723
Modified: 2024-11-21
CVE-2015-8000
db.c in named in ISC BIND 9.x before 9.9.8-P2 and 9.10.x before 9.10.3-P2 allows remote attackers to cause a denial of service (REQUIRE assertion failure and daemon exit) via a malformed class attribute.
- FEDORA-2015-40882ddfb1
- FEDORA-2015-40882ddfb1
- FEDORA-2015-09bf9e06ea
- FEDORA-2015-09bf9e06ea
- FEDORA-2015-2df40de264
- FEDORA-2015-2df40de264
- FEDORA-2015-e278e12ebc
- FEDORA-2015-e278e12ebc
- SUSE-SU-2015:2340
- SUSE-SU-2015:2340
- SUSE-SU-2015:2341
- SUSE-SU-2015:2341
- SUSE-SU-2015:2359
- SUSE-SU-2015:2359
- openSUSE-SU-2015:2364
- openSUSE-SU-2015:2364
- openSUSE-SU-2015:2365
- openSUSE-SU-2015:2365
- openSUSE-SU-2015:2391
- openSUSE-SU-2015:2391
- SUSE-SU-2016:0227
- SUSE-SU-2016:0227
- HPSBUX03552
- HPSBUX03552
- SSRT102983
- SSRT102983
- http://packetstormsecurity.com/files/134882/FreeBSD-Security-Advisory-BIND-Denial-Of-Service.html
- http://packetstormsecurity.com/files/134882/FreeBSD-Security-Advisory-BIND-Denial-Of-Service.html
- RHSA-2015:2655
- RHSA-2015:2655
- RHSA-2015:2656
- RHSA-2015:2656
- RHSA-2015:2658
- RHSA-2015:2658
- RHSA-2016:0078
- RHSA-2016:0078
- RHSA-2016:0079
- RHSA-2016:0079
- DSA-3420
- DSA-3420
- http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
- http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- 79349
- 79349
- 1034418
- 1034418
- SSA:2015-349-01
- SSA:2015-349-01
- USN-2837-1
- USN-2837-1
- https://blogs.sophos.com/2016/02/17/utm-up2date-9-354-released/
- https://blogs.sophos.com/2016/02/17/utm-up2date-9-354-released/
- https://blogs.sophos.com/2016/02/29/utm-up2date-9-319-released/
- https://blogs.sophos.com/2016/02/29/utm-up2date-9-319-released/
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04923105
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04923105
- https://kb.isc.org/article/AA-01317
- https://kb.isc.org/article/AA-01317
- https://kb.isc.org/article/AA-01380
- https://kb.isc.org/article/AA-01380
- https://kb.isc.org/article/AA-01438
- https://kb.isc.org/article/AA-01438
Modified: 2024-11-21
CVE-2015-8461
Race condition in resolver.c in named in ISC BIND 9.9.8 before 9.9.8-P2 and 9.10.3 before 9.10.3-P2 allows remote attackers to cause a denial of service (INSIST assertion failure and daemon exit) via unspecified vectors.
- FEDORA-2015-09bf9e06ea
- FEDORA-2015-09bf9e06ea
- FEDORA-2015-2df40de264
- FEDORA-2015-2df40de264
- 79347
- 79347
- 1034419
- 1034419
- SSA:2015-349-01
- SSA:2015-349-01
- https://kb.isc.org/article/AA-01319
- https://kb.isc.org/article/AA-01319
- https://kb.isc.org/article/AA-01380
- https://kb.isc.org/article/AA-01380
- https://kb.isc.org/article/AA-01438
- https://kb.isc.org/article/AA-01438
Modified: 2024-11-21
CVE-2016-1285
named in ISC BIND 9.x before 9.9.8-P4 and 9.10.x before 9.10.3-P4 does not properly handle DNAME records when parsing fetch reply messages, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a malformed packet to the rndc (aka control channel) interface, related to alist.c and sexpr.c.
- FEDORA-2016-364c0a9df4
- FEDORA-2016-364c0a9df4
- FEDORA-2016-161b73fc2c
- FEDORA-2016-161b73fc2c
- FEDORA-2016-b593e84223
- FEDORA-2016-b593e84223
- FEDORA-2016-5047abe4a9
- FEDORA-2016-5047abe4a9
- FEDORA-2016-75f31fbb0a
- FEDORA-2016-75f31fbb0a
- FEDORA-2016-dce6dbe6a8
- FEDORA-2016-dce6dbe6a8
- SUSE-SU-2016:0759
- SUSE-SU-2016:0759
- SUSE-SU-2016:0780
- SUSE-SU-2016:0780
- SUSE-SU-2016:0825
- SUSE-SU-2016:0825
- openSUSE-SU-2016:0827
- openSUSE-SU-2016:0827
- openSUSE-SU-2016:0830
- openSUSE-SU-2016:0830
- openSUSE-SU-2016:0834
- openSUSE-SU-2016:0834
- openSUSE-SU-2016:0859
- openSUSE-SU-2016:0859
- SUSE-SU-2016:1541
- SUSE-SU-2016:1541
- HPSBUX03583
- HPSBUX03583
- SSRT110084
- SSRT110084
- RHSA-2016:0562
- RHSA-2016:0562
- RHSA-2016:0601
- RHSA-2016:0601
- DSA-3511
- DSA-3511
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- 1035236
- 1035236
- USN-2925-1
- USN-2925-1
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05087821
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05087821
- https://kb.isc.org/article/AA-01352
- https://kb.isc.org/article/AA-01352
- https://kb.isc.org/article/AA-01380
- https://kb.isc.org/article/AA-01380
- https://kb.isc.org/article/AA-01438
- https://kb.isc.org/article/AA-01438
- FreeBSD-SA-16:13
- FreeBSD-SA-16:13
- GLSA-201610-07
- GLSA-201610-07
Modified: 2024-11-21
CVE-2016-1286
named in ISC BIND 9.x before 9.9.8-P4 and 9.10.x before 9.10.3-P4 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a crafted signature record for a DNAME record, related to db.c and resolver.c.
- FEDORA-2016-364c0a9df4
- FEDORA-2016-364c0a9df4
- FEDORA-2016-161b73fc2c
- FEDORA-2016-161b73fc2c
- FEDORA-2016-b593e84223
- FEDORA-2016-b593e84223
- FEDORA-2016-5047abe4a9
- FEDORA-2016-5047abe4a9
- FEDORA-2016-75f31fbb0a
- FEDORA-2016-75f31fbb0a
- FEDORA-2016-dce6dbe6a8
- FEDORA-2016-dce6dbe6a8
- SUSE-SU-2016:0759
- SUSE-SU-2016:0759
- SUSE-SU-2016:0780
- SUSE-SU-2016:0780
- SUSE-SU-2016:0825
- SUSE-SU-2016:0825
- openSUSE-SU-2016:0827
- openSUSE-SU-2016:0827
- openSUSE-SU-2016:0830
- openSUSE-SU-2016:0830
- openSUSE-SU-2016:0834
- openSUSE-SU-2016:0834
- openSUSE-SU-2016:0859
- openSUSE-SU-2016:0859
- SUSE-SU-2016:1541
- SUSE-SU-2016:1541
- HPSBUX03583
- HPSBUX03583
- SSRT110084
- SSRT110084
- RHSA-2016:0562
- RHSA-2016:0562
- RHSA-2016:0601
- RHSA-2016:0601
- DSA-3511
- DSA-3511
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- 1035237
- 1035237
- USN-2925-1
- USN-2925-1
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05087821
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05087821
- https://kb.isc.org/article/AA-01353
- https://kb.isc.org/article/AA-01353
- https://kb.isc.org/article/AA-01380
- https://kb.isc.org/article/AA-01380
- https://kb.isc.org/article/AA-01438
- https://kb.isc.org/article/AA-01438
- FreeBSD-SA-16:13
- FreeBSD-SA-16:13
- GLSA-201610-07
- GLSA-201610-07