ALT-PU-2016-2260-1
Closed vulnerabilities
BDU:2020-00776
Уязвимость сервера DNS BIND, связанная с ошибками обработки данных, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2013-2266
libdns in ISC BIND 9.7.x and 9.8.x before 9.8.4-P2, 9.8.5 before 9.8.5b2, 9.9.x before 9.9.2-P2, and 9.9.3 before 9.9.3b2 on UNIX platforms allows remote attackers to cause a denial of service (memory consumption) via a crafted regular expression, as demonstrated by a memory-exhaustion attack against a machine running a named process.
- http://linux.oracle.com/errata/ELSA-2014-1244
- http://linux.oracle.com/errata/ELSA-2014-1244
- APPLE-SA-2013-09-12-1
- APPLE-SA-2013-09-12-1
- FEDORA-2013-4525
- FEDORA-2013-4525
- FEDORA-2013-4533
- FEDORA-2013-4533
- HPSBUX02876
- HPSBUX02876
- SSRT101148
- SSRT101148
- RHSA-2013:0689
- RHSA-2013:0689
- RHSA-2013:0690
- RHSA-2013:0690
- http://support.apple.com/kb/HT5880
- http://support.apple.com/kb/HT5880
- DSA-2656
- DSA-2656
- http://www.isc.org/software/bind/advisories/cve-2013-2266
- http://www.isc.org/software/bind/advisories/cve-2013-2266
- 58736
- 58736
- USN-1783-1
- USN-1783-1
- https://kb.isc.org/article/AA-00871/
- https://kb.isc.org/article/AA-00871/
- https://kb.isc.org/article/AA-00879/
- https://kb.isc.org/article/AA-00879/
- oval:org.mitre.oval:def:19579
- oval:org.mitre.oval:def:19579
Modified: 2024-11-21
CVE-2013-3919
resolver.c in ISC BIND 9.8.5 before 9.8.5-P1, 9.9.3 before 9.9.3-P1, and 9.6-ESV-R9 before 9.6-ESV-R9-P1, when a recursive resolver is configured, allows remote attackers to cause a denial of service (assertion failure and named daemon exit) via a query for a record in a malformed zone.
Modified: 2024-11-21
CVE-2013-4854
The RFC 5011 implementation in rdata.c in ISC BIND 9.7.x and 9.8.x before 9.8.5-P2, 9.8.6b1, 9.9.x before 9.9.3-P2, and 9.9.4b1, and DNSco BIND 9.9.3-S1 before 9.9.3-S1-P1 and 9.9.4-S1b1, allows remote attackers to cause a denial of service (assertion failure and named daemon exit) via a query with a malformed RDATA section that is not properly handled during construction of a log message, as exploited in the wild in July 2013.
- 20130806 [slackware-security] bind (SSA:2013-218-01)
- 20130806 [slackware-security] bind (SSA:2013-218-01)
- APPLE-SA-2014-10-16-3
- APPLE-SA-2014-10-16-3
- http://linux.oracle.com/errata/ELSA-2014-1244
- http://linux.oracle.com/errata/ELSA-2014-1244
- FEDORA-2013-13863
- FEDORA-2013-13863
- FEDORA-2013-13831
- FEDORA-2013-13831
- SUSE-SU-2013:1310
- SUSE-SU-2013:1310
- openSUSE-SU-2013:1354
- openSUSE-SU-2013:1354
- RHSA-2013:1114
- RHSA-2013:1114
- RHSA-2013:1115
- RHSA-2013:1115
- 54134
- 54134
- 54185
- 54185
- 54207
- 54207
- 54211
- 54211
- 54323
- 54323
- 54432
- 54432
- DSA-2728
- DSA-2728
- FreeBSD-SA-13:07
- FreeBSD-SA-13:07
- MDVSA-2013:202
- MDVSA-2013:202
- 61479
- 61479
- 1028838
- 1028838
- USN-1910-1
- USN-1910-1
- http://www.zerodayinitiative.com/advisories/ZDI-13-210/
- http://www.zerodayinitiative.com/advisories/ZDI-13-210/
- isc-bind-cve20134854-dos(86004)
- isc-bind-cve20134854-dos(86004)
- HPSBUX02926
- HPSBUX02926
- SSRT101281
- SSRT101281
- https://kb.isc.org/article/AA-01015
- https://kb.isc.org/article/AA-01015
- https://kb.isc.org/article/AA-01016
- https://kb.isc.org/article/AA-01016
- https://kc.mcafee.com/corporate/index?page=content&id=SB10052
- https://kc.mcafee.com/corporate/index?page=content&id=SB10052
- oval:org.mitre.oval:def:19561
- oval:org.mitre.oval:def:19561
- https://support.apple.com/kb/HT6536
- https://support.apple.com/kb/HT6536
Modified: 2024-11-21
CVE-2013-6230
The Winsock WSAIoctl API in Microsoft Windows Server 2008, as used in ISC BIND 9.6-ESV before 9.6-ESV-R10-P1, 9.8 before 9.8.6-P1, 9.9 before 9.9.4-P1, 9.9.3-S1, 9.9.4-S1, and other products, does not properly support the SIO_GET_INTERFACE_LIST command for netmask 255.255.255.255, which allows remote attackers to bypass intended IP address restrictions by leveraging misinterpretation of this netmask as a 0.0.0.0 netmask.
Modified: 2024-11-21
CVE-2014-8500
ISC BIND 9.0.x through 9.8.x, 9.9.0 through 9.9.6, and 9.10.0 through 9.10.1 does not limit delegation chaining, which allows remote attackers to cause a denial of service (memory consumption and named crash) via a large or infinite number of referrals.
- http://advisories.mageia.org/MGASA-2014-0524.html
- http://advisories.mageia.org/MGASA-2014-0524.html
- http://cert.ssi.gouv.fr/site/CERTFR-2014-AVI-512/index.html
- http://cert.ssi.gouv.fr/site/CERTFR-2014-AVI-512/index.html
- NetBSD-SA2015-002
- NetBSD-SA2015-002
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10676
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10676
- APPLE-SA-2015-09-16-4
- APPLE-SA-2015-09-16-4
- SUSE-SU-2015:0011
- SUSE-SU-2015:0011
- SUSE-SU-2015:0096
- SUSE-SU-2015:0096
- SUSE-SU-2015:0480
- SUSE-SU-2015:0480
- SUSE-SU-2015:0488
- SUSE-SU-2015:0488
- openSUSE-SU-2015:1250
- openSUSE-SU-2015:1250
- HPSBUX03235
- HPSBUX03235
- SSRT101750
- SSRT101750
- HPSBUX03400
- HPSBUX03400
- SSRT102211
- SSRT102211
- RHSA-2016:0078
- RHSA-2016:0078
- 62064
- 62064
- 62122
- 62122
- GLSA-201502-03
- GLSA-201502-03
- 1031311
- 1031311
- USN-2437-1
- USN-2437-1
- DSA-3094
- DSA-3094
- VU#264212
- VU#264212
- MDVSA-2015:165
- MDVSA-2015:165
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- 71590
- 71590
- https://kb.isc.org/article/AA-01216/
- https://kb.isc.org/article/AA-01216/
- https://security.netapp.com/advisory/ntap-20190730-0002/
- https://security.netapp.com/advisory/ntap-20190730-0002/
- https://support.apple.com/HT205219
- https://support.apple.com/HT205219
Modified: 2024-11-21
CVE-2015-1349
named in ISC BIND 9.7.0 through 9.9.6 before 9.9.6-P2 and 9.10.x before 9.10.1-P2, when DNSSEC validation and the managed-keys feature are enabled, allows remote attackers to cause a denial of service (assertion failure and daemon exit, or daemon crash) by triggering an incorrect trust-anchor management scenario in which no key is ready for use.
- http://advisories.mageia.org/MGASA-2015-0082.html
- http://advisories.mageia.org/MGASA-2015-0082.html
- APPLE-SA-2015-09-16-4
- APPLE-SA-2015-09-16-4
- FEDORA-2015-2543
- FEDORA-2015-2543
- FEDORA-2015-2548
- FEDORA-2015-2548
- SUSE-SU-2015:1205
- SUSE-SU-2015:1205
- openSUSE-SU-2015:1326
- openSUSE-SU-2015:1326
- openSUSE-SU-2015:1250
- openSUSE-SU-2015:1250
- HPSBUX03379
- HPSBUX03379
- SSRT101976
- SSRT101976
- RHSA-2015:0672
- RHSA-2015:0672
- MDVSA-2015:054
- MDVSA-2015:054
- MDVSA-2015:165
- MDVSA-2015:165
- USN-2503-1
- USN-2503-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1193820
- https://bugzilla.redhat.com/show_bug.cgi?id=1193820
- https://kb.isc.org/article/AA-01235
- https://kb.isc.org/article/AA-01235
- https://kb.juniper.net/JSA10783
- https://kb.juniper.net/JSA10783
- https://kc.mcafee.com/corporate/index?page=content&id=SB10116
- https://kc.mcafee.com/corporate/index?page=content&id=SB10116
- GLSA-201510-01
- GLSA-201510-01
- https://support.apple.com/HT205219
- https://support.apple.com/HT205219
Modified: 2024-11-21
CVE-2015-4620
name.c in named in ISC BIND 9.7.x through 9.9.x before 9.9.7-P1 and 9.10.x before 9.10.2-P2, when configured as a recursive resolver with DNSSEC validation, allows remote attackers to cause a denial of service (REQUIRE assertion failure and daemon exit) by constructing crafted zone data and then making a query for a name in that zone.
- FEDORA-2015-11483
- FEDORA-2015-11483
- FEDORA-2015-11484
- FEDORA-2015-11484
- SUSE-SU-2015:1205
- SUSE-SU-2015:1205
- openSUSE-SU-2015:1326
- openSUSE-SU-2015:1326
- openSUSE-SU-2015:1250
- openSUSE-SU-2015:1250
- HPSBUX03379
- HPSBUX03379
- SSRT101976
- SSRT101976
- RHSA-2015:1443
- RHSA-2015:1443
- RHSA-2015:1471
- RHSA-2015:1471
- DSA-3304
- DSA-3304
- 75588
- 75588
- 1032799
- 1032799
- USN-2669-1
- USN-2669-1
- https://kb.isc.org/article/AA-01267
- https://kb.isc.org/article/AA-01267
- https://kb.isc.org/article/AA-01305
- https://kb.isc.org/article/AA-01305
- https://kb.isc.org/article/AA-01306
- https://kb.isc.org/article/AA-01306
- https://kb.isc.org/article/AA-01307
- https://kb.isc.org/article/AA-01307
- https://kb.isc.org/article/AA-01438
- https://kb.isc.org/article/AA-01438
- https://kb.juniper.net/JSA10783
- https://kb.juniper.net/JSA10783
- https://kc.mcafee.com/corporate/index?page=content&id=SB10124
- https://kc.mcafee.com/corporate/index?page=content&id=SB10124
- GLSA-201510-01
- GLSA-201510-01
- https://security.netapp.com/advisory/ntap-20190903-0003/
- https://security.netapp.com/advisory/ntap-20190903-0003/
Modified: 2024-11-21
CVE-2015-5477
named in ISC BIND 9.x before 9.9.7-P2 and 9.10.x before 9.10.2-P3 allows remote attackers to cause a denial of service (REQUIRE assertion failure and daemon exit) via TKEY queries.
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10718
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10718
- FEDORA-2015-12335
- FEDORA-2015-12335
- FEDORA-2015-12357
- FEDORA-2015-12357
- FEDORA-2015-12316
- FEDORA-2015-12316
- SUSE-SU-2015:1304
- SUSE-SU-2015:1304
- SUSE-SU-2015:1305
- SUSE-SU-2015:1305
- SUSE-SU-2015:1316
- SUSE-SU-2015:1316
- SUSE-SU-2015:1322
- SUSE-SU-2015:1322
- openSUSE-SU-2015:1326
- openSUSE-SU-2015:1326
- openSUSE-SU-2015:1335
- openSUSE-SU-2015:1335
- SUSE-SU-2016:0227
- SUSE-SU-2016:0227
- HPSBUX03400
- HPSBUX03400
- SSRT102211
- SSRT102211
- HPSBUX03410
- HPSBUX03410
- SSRT102175
- SSRT102175
- HPSBOV03506
- HPSBOV03506
- HPSBUX03511
- HPSBUX03511
- SSRT102248
- SSRT102248
- http://packetstormsecurity.com/files/132926/BIND-TKEY-Query-Denial-Of-Service.html
- http://packetstormsecurity.com/files/132926/BIND-TKEY-Query-Denial-Of-Service.html
- RHSA-2015:1513
- RHSA-2015:1513
- RHSA-2015:1514
- RHSA-2015:1514
- RHSA-2015:1515
- RHSA-2015:1515
- RHSA-2016:0078
- RHSA-2016:0078
- RHSA-2016:0079
- RHSA-2016:0079
- DSA-3319
- DSA-3319
- http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- 76092
- 76092
- 1033100
- 1033100
- USN-2693-1
- USN-2693-1
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04789415
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04789415
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04952480
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04952480
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05095918
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05095918
- https://kb.isc.org/article/AA-01272
- https://kb.isc.org/article/AA-01272
- https://kb.isc.org/article/AA-01305
- https://kb.isc.org/article/AA-01305
- https://kb.isc.org/article/AA-01306
- https://kb.isc.org/article/AA-01306
- https://kb.isc.org/article/AA-01307
- https://kb.isc.org/article/AA-01307
- https://kb.isc.org/article/AA-01438
- https://kb.isc.org/article/AA-01438
- https://kb.juniper.net/JSA10783
- https://kb.juniper.net/JSA10783
- https://kc.mcafee.com/corporate/index?page=content&id=SB10126
- https://kc.mcafee.com/corporate/index?page=content&id=SB10126
- GLSA-201510-01
- GLSA-201510-01
- https://security.netapp.com/advisory/ntap-20160114-0001/
- https://security.netapp.com/advisory/ntap-20160114-0001/
- https://support.apple.com/kb/HT205032
- https://support.apple.com/kb/HT205032
- 37721
- 37721
- 37723
- 37723
Modified: 2024-11-21
CVE-2016-2776
buffer.c in named in ISC BIND 9 before 9.9.9-P3, 9.10.x before 9.10.4-P3, and 9.11.x before 9.11.0rc3 does not properly construct responses, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a crafted query.
- RHSA-2016:1944
- RHSA-2016:1944
- RHSA-2016:1945
- RHSA-2016:1945
- RHSA-2016:2099
- RHSA-2016:2099
- http://www.oracle.com/technetwork/topics/security/bulletinoct2016-3090566.html
- http://www.oracle.com/technetwork/topics/security/bulletinoct2016-3090566.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html
- 93188
- 93188
- 1036903
- 1036903
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05321107
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05321107
- https://kb.isc.org/article/AA-01419/0
- https://kb.isc.org/article/AA-01419/0
- https://kb.isc.org/article/AA-01435
- https://kb.isc.org/article/AA-01435
- https://kb.isc.org/article/AA-01436
- https://kb.isc.org/article/AA-01436
- https://kb.isc.org/article/AA-01438
- https://kb.isc.org/article/AA-01438
- FreeBSD-SA-16:28
- FreeBSD-SA-16:28
- GLSA-201610-07
- GLSA-201610-07
- https://security.netapp.com/advisory/ntap-20160930-0001/
- https://security.netapp.com/advisory/ntap-20160930-0001/
- 40453
- 40453
Modified: 2024-11-21
CVE-2016-8864
named in ISC BIND 9.x before 9.9.9-P4, 9.10.x before 9.10.4-P4, and 9.11.x before 9.11.0-P1 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a DNAME record in the answer section of a response to a recursive query, related to db.c and resolver.c.
- RHSA-2016:2141
- RHSA-2016:2141
- RHSA-2016:2142
- RHSA-2016:2142
- RHSA-2016:2615
- RHSA-2016:2615
- RHSA-2016:2871
- RHSA-2016:2871
- DSA-3703
- DSA-3703
- 94067
- 94067
- 1037156
- 1037156
- RHSA-2017:1583
- RHSA-2017:1583
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05381687
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05381687
- https://kb.isc.org/article/AA-01434
- https://kb.isc.org/article/AA-01434
- https://kb.isc.org/article/AA-01435
- https://kb.isc.org/article/AA-01435
- https://kb.isc.org/article/AA-01436
- https://kb.isc.org/article/AA-01436
- https://kb.isc.org/article/AA-01437
- https://kb.isc.org/article/AA-01437
- https://kb.isc.org/article/AA-01438
- https://kb.isc.org/article/AA-01438
- FreeBSD-SA-16:34
- FreeBSD-SA-16:34
- GLSA-201701-26
- GLSA-201701-26
- https://security.netapp.com/advisory/ntap-20180926-0005/
- https://security.netapp.com/advisory/ntap-20180926-0005/
Closed bugs
bind: Необходимо обеспечить совместимость службы с systemd
[DNS Amplification Attacks] Включить поддержку DNS RRL (доступно, начиная с 9.9.4 и 9.10.x)
[Feature Request] Собрать bind с опцией --enable-fetchlimit