ALT-PU-2016-2260-1
Closed vulnerabilities
BDU:2020-00776
Уязвимость сервера DNS BIND, связанная с ошибками обработки данных, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-04-11
CVE-2013-2266
libdns in ISC BIND 9.7.x and 9.8.x before 9.8.4-P2, 9.8.5 before 9.8.5b2, 9.9.x before 9.9.2-P2, and 9.9.3 before 9.9.3b2 on UNIX platforms allows remote attackers to cause a denial of service (memory consumption) via a crafted regular expression, as demonstrated by a memory-exhaustion attack against a machine running a named process.
- http://linux.oracle.com/errata/ELSA-2014-1244
- http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html
- http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101500.html
- http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101603.html
- http://marc.info/?l=bugtraq&m=136804614120794&w=2
- http://marc.info/?l=bugtraq&m=136804614120794&w=2
- http://rhn.redhat.com/errata/RHSA-2013-0689.html
- http://rhn.redhat.com/errata/RHSA-2013-0690.html
- http://support.apple.com/kb/HT5880
- http://www.debian.org/security/2013/dsa-2656
- http://www.isc.org/software/bind/advisories/cve-2013-2266
- http://www.securityfocus.com/bid/58736
- http://www.ubuntu.com/usn/USN-1783-1
- https://kb.isc.org/article/AA-00871/
- https://kb.isc.org/article/AA-00879/
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19579
- http://linux.oracle.com/errata/ELSA-2014-1244
- http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html
- http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101500.html
- http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101603.html
- http://marc.info/?l=bugtraq&m=136804614120794&w=2
- http://marc.info/?l=bugtraq&m=136804614120794&w=2
- http://rhn.redhat.com/errata/RHSA-2013-0689.html
- http://rhn.redhat.com/errata/RHSA-2013-0690.html
- http://support.apple.com/kb/HT5880
- http://www.debian.org/security/2013/dsa-2656
- http://www.isc.org/software/bind/advisories/cve-2013-2266
- http://www.securityfocus.com/bid/58736
- http://www.ubuntu.com/usn/USN-1783-1
- https://kb.isc.org/article/AA-00871/
- https://kb.isc.org/article/AA-00879/
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19579
Modified: 2025-04-11
CVE-2013-3919
resolver.c in ISC BIND 9.8.5 before 9.8.5-P1, 9.9.3 before 9.9.3-P1, and 9.6-ESV-R9 before 9.6-ESV-R9-P1, when a recursive resolver is configured, allows remote attackers to cause a denial of service (assertion failure and named daemon exit) via a query for a record in a malformed zone.
Modified: 2025-04-11
CVE-2013-4854
The RFC 5011 implementation in rdata.c in ISC BIND 9.7.x and 9.8.x before 9.8.5-P2, 9.8.6b1, 9.9.x before 9.9.3-P2, and 9.9.4b1, and DNSco BIND 9.9.3-S1 before 9.9.3-S1-P1 and 9.9.4-S1b1, allows remote attackers to cause a denial of service (assertion failure and named daemon exit) via a query with a malformed RDATA section that is not properly handled during construction of a log message, as exploited in the wild in July 2013.
- http://archives.neohapsis.com/archives/bugtraq/2013-08/0030.html
- http://archives.neohapsis.com/archives/bugtraq/2014-10/0103.html
- http://linux.oracle.com/errata/ELSA-2014-1244
- http://lists.fedoraproject.org/pipermail/package-announce/2013-August/113108.html
- http://lists.fedoraproject.org/pipermail/package-announce/2013-August/113251.html
- http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00018.html
- http://rhn.redhat.com/errata/RHSA-2013-1114.html
- http://rhn.redhat.com/errata/RHSA-2013-1115.html
- http://secunia.com/advisories/54134
- http://secunia.com/advisories/54185
- http://secunia.com/advisories/54207
- http://secunia.com/advisories/54211
- http://secunia.com/advisories/54323
- http://secunia.com/advisories/54432
- http://www.debian.org/security/2013/dsa-2728
- http://www.freebsd.org/security/advisories/FreeBSD-SA-13:07.bind.asc
- http://www.mandriva.com/security/advisories?name=MDVSA-2013:202
- http://www.securityfocus.com/bid/61479
- http://www.securitytracker.com/id/1028838
- http://www.ubuntu.com/usn/USN-1910-1
- http://www.zerodayinitiative.com/advisories/ZDI-13-210/
- https://exchange.xforce.ibmcloud.com/vulnerabilities/86004
- https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03922396
- https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03922396
- https://kb.isc.org/article/AA-01015
- https://kb.isc.org/article/AA-01016
- https://kc.mcafee.com/corporate/index?page=content&id=SB10052
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19561
- https://support.apple.com/kb/HT6536
- http://archives.neohapsis.com/archives/bugtraq/2013-08/0030.html
- http://archives.neohapsis.com/archives/bugtraq/2014-10/0103.html
- http://linux.oracle.com/errata/ELSA-2014-1244
- http://lists.fedoraproject.org/pipermail/package-announce/2013-August/113108.html
- http://lists.fedoraproject.org/pipermail/package-announce/2013-August/113251.html
- http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00018.html
- http://rhn.redhat.com/errata/RHSA-2013-1114.html
- http://rhn.redhat.com/errata/RHSA-2013-1115.html
- http://secunia.com/advisories/54134
- http://secunia.com/advisories/54185
- http://secunia.com/advisories/54207
- http://secunia.com/advisories/54211
- http://secunia.com/advisories/54323
- http://secunia.com/advisories/54432
- http://www.debian.org/security/2013/dsa-2728
- http://www.freebsd.org/security/advisories/FreeBSD-SA-13:07.bind.asc
- http://www.mandriva.com/security/advisories?name=MDVSA-2013:202
- http://www.securityfocus.com/bid/61479
- http://www.securitytracker.com/id/1028838
- http://www.ubuntu.com/usn/USN-1910-1
- http://www.zerodayinitiative.com/advisories/ZDI-13-210/
- https://exchange.xforce.ibmcloud.com/vulnerabilities/86004
- https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03922396
- https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03922396
- https://kb.isc.org/article/AA-01015
- https://kb.isc.org/article/AA-01016
- https://kc.mcafee.com/corporate/index?page=content&id=SB10052
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19561
- https://support.apple.com/kb/HT6536
Modified: 2025-04-11
CVE-2013-6230
The Winsock WSAIoctl API in Microsoft Windows Server 2008, as used in ISC BIND 9.6-ESV before 9.6-ESV-R10-P1, 9.8 before 9.8.6-P1, 9.9 before 9.9.4-P1, 9.9.3-S1, 9.9.4-S1, and other products, does not properly support the SIO_GET_INTERFACE_LIST command for netmask 255.255.255.255, which allows remote attackers to bypass intended IP address restrictions by leveraging misinterpretation of this netmask as a 0.0.0.0 netmask.
- http://www.slackware.com/security/viewer.php?l=slackware-security&y=2014&m=slackware-security.518391
- https://kb.isc.org/article/AA-01062
- https://kb.isc.org/article/AA-01063
- http://www.slackware.com/security/viewer.php?l=slackware-security&y=2014&m=slackware-security.518391
- https://kb.isc.org/article/AA-01062
- https://kb.isc.org/article/AA-01063
Modified: 2025-04-12
CVE-2014-8500
ISC BIND 9.0.x through 9.8.x, 9.9.0 through 9.9.6, and 9.10.0 through 9.10.1 does not limit delegation chaining, which allows remote attackers to cause a denial of service (memory consumption and named crash) via a large or infinite number of referrals.
- http://advisories.mageia.org/MGASA-2014-0524.html
- http://cert.ssi.gouv.fr/site/CERTFR-2014-AVI-512/index.html
- http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2015-002.txt.asc
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10676
- http://lists.apple.com/archives/security-announce/2015/Sep/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00001.html
- http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00017.html
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00009.html
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00013.html
- http://lists.opensuse.org/opensuse-updates/2015-07/msg00038.html
- http://marc.info/?l=bugtraq&m=142180687100892&w=2
- http://marc.info/?l=bugtraq&m=142180687100892&w=2
- http://marc.info/?l=bugtraq&m=144000632319155&w=2
- http://marc.info/?l=bugtraq&m=144000632319155&w=2
- http://rhn.redhat.com/errata/RHSA-2016-0078.html
- http://secunia.com/advisories/62064
- http://secunia.com/advisories/62122
- http://security.gentoo.org/glsa/glsa-201502-03.xml
- http://securitytracker.com/id?1031311
- http://ubuntu.com/usn/usn-2437-1
- http://www.debian.org/security/2014/dsa-3094
- http://www.kb.cert.org/vuls/id/264212
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:165
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.securityfocus.com/bid/71590
- https://kb.isc.org/article/AA-01216/
- https://security.netapp.com/advisory/ntap-20190730-0002/
- https://support.apple.com/HT205219
- http://advisories.mageia.org/MGASA-2014-0524.html
- http://cert.ssi.gouv.fr/site/CERTFR-2014-AVI-512/index.html
- http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2015-002.txt.asc
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10676
- http://lists.apple.com/archives/security-announce/2015/Sep/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00001.html
- http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00017.html
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00009.html
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00013.html
- http://lists.opensuse.org/opensuse-updates/2015-07/msg00038.html
- http://marc.info/?l=bugtraq&m=142180687100892&w=2
- http://marc.info/?l=bugtraq&m=142180687100892&w=2
- http://marc.info/?l=bugtraq&m=144000632319155&w=2
- http://marc.info/?l=bugtraq&m=144000632319155&w=2
- http://rhn.redhat.com/errata/RHSA-2016-0078.html
- http://secunia.com/advisories/62064
- http://secunia.com/advisories/62122
- http://security.gentoo.org/glsa/glsa-201502-03.xml
- http://securitytracker.com/id?1031311
- http://ubuntu.com/usn/usn-2437-1
- http://www.debian.org/security/2014/dsa-3094
- http://www.kb.cert.org/vuls/id/264212
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:165
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.securityfocus.com/bid/71590
- https://kb.isc.org/article/AA-01216/
- https://security.netapp.com/advisory/ntap-20190730-0002/
- https://support.apple.com/HT205219
Modified: 2025-04-12
CVE-2015-1349
named in ISC BIND 9.7.0 through 9.9.6 before 9.9.6-P2 and 9.10.x before 9.10.1-P2, when DNSSEC validation and the managed-keys feature are enabled, allows remote attackers to cause a denial of service (assertion failure and daemon exit, or daemon crash) by triggering an incorrect trust-anchor management scenario in which no key is ready for use.
- http://advisories.mageia.org/MGASA-2015-0082.html
- http://lists.apple.com/archives/security-announce/2015/Sep/msg00004.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/150904.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/150905.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00013.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00050.html
- http://lists.opensuse.org/opensuse-updates/2015-07/msg00038.html
- http://marc.info/?l=bugtraq&m=143740940810833&w=2
- http://marc.info/?l=bugtraq&m=143740940810833&w=2
- http://rhn.redhat.com/errata/RHSA-2015-0672.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:054
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:165
- http://www.ubuntu.com/usn/USN-2503-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1193820
- https://kb.isc.org/article/AA-01235
- https://kb.juniper.net/JSA10783
- https://kc.mcafee.com/corporate/index?page=content&id=SB10116
- https://security.gentoo.org/glsa/201510-01
- https://support.apple.com/HT205219
- http://advisories.mageia.org/MGASA-2015-0082.html
- http://lists.apple.com/archives/security-announce/2015/Sep/msg00004.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/150904.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/150905.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00013.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00050.html
- http://lists.opensuse.org/opensuse-updates/2015-07/msg00038.html
- http://marc.info/?l=bugtraq&m=143740940810833&w=2
- http://marc.info/?l=bugtraq&m=143740940810833&w=2
- http://rhn.redhat.com/errata/RHSA-2015-0672.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:054
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:165
- http://www.ubuntu.com/usn/USN-2503-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1193820
- https://kb.isc.org/article/AA-01235
- https://kb.juniper.net/JSA10783
- https://kc.mcafee.com/corporate/index?page=content&id=SB10116
- https://security.gentoo.org/glsa/201510-01
- https://support.apple.com/HT205219
Modified: 2025-04-12
CVE-2015-4620
name.c in named in ISC BIND 9.7.x through 9.9.x before 9.9.7-P1 and 9.10.x before 9.10.2-P2, when configured as a recursive resolver with DNSSEC validation, allows remote attackers to cause a denial of service (REQUIRE assertion failure and daemon exit) by constructing crafted zone data and then making a query for a name in that zone.
- http://lists.fedoraproject.org/pipermail/package-announce/2015-July/162040.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-July/162286.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00013.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00050.html
- http://lists.opensuse.org/opensuse-updates/2015-07/msg00038.html
- http://marc.info/?l=bugtraq&m=143740940810833&w=2
- http://marc.info/?l=bugtraq&m=143740940810833&w=2
- http://rhn.redhat.com/errata/RHSA-2015-1443.html
- http://rhn.redhat.com/errata/RHSA-2015-1471.html
- http://www.debian.org/security/2015/dsa-3304
- http://www.securityfocus.com/bid/75588
- http://www.securitytracker.com/id/1032799
- http://www.ubuntu.com/usn/USN-2669-1
- https://kb.isc.org/article/AA-01267
- https://kb.isc.org/article/AA-01305
- https://kb.isc.org/article/AA-01306
- https://kb.isc.org/article/AA-01307
- https://kb.isc.org/article/AA-01438
- https://kb.juniper.net/JSA10783
- https://kc.mcafee.com/corporate/index?page=content&id=SB10124
- https://security.gentoo.org/glsa/201510-01
- https://security.netapp.com/advisory/ntap-20190903-0003/
- http://lists.fedoraproject.org/pipermail/package-announce/2015-July/162040.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-July/162286.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00013.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00050.html
- http://lists.opensuse.org/opensuse-updates/2015-07/msg00038.html
- http://marc.info/?l=bugtraq&m=143740940810833&w=2
- http://marc.info/?l=bugtraq&m=143740940810833&w=2
- http://rhn.redhat.com/errata/RHSA-2015-1443.html
- http://rhn.redhat.com/errata/RHSA-2015-1471.html
- http://www.debian.org/security/2015/dsa-3304
- http://www.securityfocus.com/bid/75588
- http://www.securitytracker.com/id/1032799
- http://www.ubuntu.com/usn/USN-2669-1
- https://kb.isc.org/article/AA-01267
- https://kb.isc.org/article/AA-01305
- https://kb.isc.org/article/AA-01306
- https://kb.isc.org/article/AA-01307
- https://kb.isc.org/article/AA-01438
- https://kb.juniper.net/JSA10783
- https://kc.mcafee.com/corporate/index?page=content&id=SB10124
- https://security.gentoo.org/glsa/201510-01
- https://security.netapp.com/advisory/ntap-20190903-0003/
Modified: 2025-04-12
CVE-2015-5477
named in ISC BIND 9.x before 9.9.7-P2 and 9.10.x before 9.10.2-P3 allows remote attackers to cause a denial of service (REQUIRE assertion failure and daemon exit) via TKEY queries.
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10718
- http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163006.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163007.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163015.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00043.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00044.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00045.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00048.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00050.html
- http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00001.html
- http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00033.html
- http://marc.info/?l=bugtraq&m=144000632319155&w=2
- http://marc.info/?l=bugtraq&m=144000632319155&w=2
- http://marc.info/?l=bugtraq&m=144017354030745&w=2
- http://marc.info/?l=bugtraq&m=144017354030745&w=2
- http://marc.info/?l=bugtraq&m=144181171013996&w=2
- http://marc.info/?l=bugtraq&m=144294073801304&w=2
- http://marc.info/?l=bugtraq&m=144294073801304&w=2
- http://packetstormsecurity.com/files/132926/BIND-TKEY-Query-Denial-Of-Service.html
- http://rhn.redhat.com/errata/RHSA-2015-1513.html
- http://rhn.redhat.com/errata/RHSA-2015-1514.html
- http://rhn.redhat.com/errata/RHSA-2015-1515.html
- http://rhn.redhat.com/errata/RHSA-2016-0078.html
- http://rhn.redhat.com/errata/RHSA-2016-0079.html
- http://www.debian.org/security/2015/dsa-3319
- http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.securityfocus.com/bid/76092
- http://www.securitytracker.com/id/1033100
- http://www.ubuntu.com/usn/USN-2693-1
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04789415
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04952480
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05095918
- https://kb.isc.org/article/AA-01272
- https://kb.isc.org/article/AA-01305
- https://kb.isc.org/article/AA-01306
- https://kb.isc.org/article/AA-01307
- https://kb.isc.org/article/AA-01438
- https://kb.juniper.net/JSA10783
- https://kc.mcafee.com/corporate/index?page=content&id=SB10126
- https://security.gentoo.org/glsa/201510-01
- https://security.netapp.com/advisory/ntap-20160114-0001/
- https://support.apple.com/kb/HT205032
- https://www.exploit-db.com/exploits/37721/
- https://www.exploit-db.com/exploits/37723/
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10718
- http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163006.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163007.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163015.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00043.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00044.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00045.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00048.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00050.html
- http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00001.html
- http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00033.html
- http://marc.info/?l=bugtraq&m=144000632319155&w=2
- http://marc.info/?l=bugtraq&m=144000632319155&w=2
- http://marc.info/?l=bugtraq&m=144017354030745&w=2
- http://marc.info/?l=bugtraq&m=144017354030745&w=2
- http://marc.info/?l=bugtraq&m=144181171013996&w=2
- http://marc.info/?l=bugtraq&m=144294073801304&w=2
- http://marc.info/?l=bugtraq&m=144294073801304&w=2
- http://packetstormsecurity.com/files/132926/BIND-TKEY-Query-Denial-Of-Service.html
- http://rhn.redhat.com/errata/RHSA-2015-1513.html
- http://rhn.redhat.com/errata/RHSA-2015-1514.html
- http://rhn.redhat.com/errata/RHSA-2015-1515.html
- http://rhn.redhat.com/errata/RHSA-2016-0078.html
- http://rhn.redhat.com/errata/RHSA-2016-0079.html
- http://www.debian.org/security/2015/dsa-3319
- http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.securityfocus.com/bid/76092
- http://www.securitytracker.com/id/1033100
- http://www.ubuntu.com/usn/USN-2693-1
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04789415
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04952480
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05095918
- https://kb.isc.org/article/AA-01272
- https://kb.isc.org/article/AA-01305
- https://kb.isc.org/article/AA-01306
- https://kb.isc.org/article/AA-01307
- https://kb.isc.org/article/AA-01438
- https://kb.juniper.net/JSA10783
- https://kc.mcafee.com/corporate/index?page=content&id=SB10126
- https://security.gentoo.org/glsa/201510-01
- https://security.netapp.com/advisory/ntap-20160114-0001/
- https://support.apple.com/kb/HT205032
- https://www.exploit-db.com/exploits/37721/
- https://www.exploit-db.com/exploits/37723/
Modified: 2025-04-12
CVE-2016-2776
buffer.c in named in ISC BIND 9 before 9.9.9-P3, 9.10.x before 9.10.4-P3, and 9.11.x before 9.11.0rc3 does not properly construct responses, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a crafted query.
- http://rhn.redhat.com/errata/RHSA-2016-1944.html
- http://rhn.redhat.com/errata/RHSA-2016-1945.html
- http://rhn.redhat.com/errata/RHSA-2016-2099.html
- http://www.oracle.com/technetwork/topics/security/bulletinoct2016-3090566.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html
- http://www.securityfocus.com/bid/93188
- http://www.securitytracker.com/id/1036903
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05321107
- https://kb.isc.org/article/AA-01419/0
- https://kb.isc.org/article/AA-01435
- https://kb.isc.org/article/AA-01436
- https://kb.isc.org/article/AA-01438
- https://security.FreeBSD.org/advisories/FreeBSD-SA-16:28.bind.asc
- https://security.gentoo.org/glsa/201610-07
- https://security.netapp.com/advisory/ntap-20160930-0001/
- https://www.exploit-db.com/exploits/40453/
- http://rhn.redhat.com/errata/RHSA-2016-1944.html
- http://rhn.redhat.com/errata/RHSA-2016-1945.html
- http://rhn.redhat.com/errata/RHSA-2016-2099.html
- http://www.oracle.com/technetwork/topics/security/bulletinoct2016-3090566.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html
- http://www.securityfocus.com/bid/93188
- http://www.securitytracker.com/id/1036903
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05321107
- https://kb.isc.org/article/AA-01419/0
- https://kb.isc.org/article/AA-01435
- https://kb.isc.org/article/AA-01436
- https://kb.isc.org/article/AA-01438
- https://security.FreeBSD.org/advisories/FreeBSD-SA-16:28.bind.asc
- https://security.gentoo.org/glsa/201610-07
- https://security.netapp.com/advisory/ntap-20160930-0001/
- https://www.exploit-db.com/exploits/40453/
Modified: 2025-04-12
CVE-2016-8864
named in ISC BIND 9.x before 9.9.9-P4, 9.10.x before 9.10.4-P4, and 9.11.x before 9.11.0-P1 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a DNAME record in the answer section of a response to a recursive query, related to db.c and resolver.c.
- http://rhn.redhat.com/errata/RHSA-2016-2141.html
- http://rhn.redhat.com/errata/RHSA-2016-2142.html
- http://rhn.redhat.com/errata/RHSA-2016-2615.html
- http://rhn.redhat.com/errata/RHSA-2016-2871.html
- http://www.debian.org/security/2016/dsa-3703
- http://www.securityfocus.com/bid/94067
- http://www.securitytracker.com/id/1037156
- https://access.redhat.com/errata/RHSA-2017:1583
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05381687
- https://kb.isc.org/article/AA-01434
- https://kb.isc.org/article/AA-01435
- https://kb.isc.org/article/AA-01436
- https://kb.isc.org/article/AA-01437
- https://kb.isc.org/article/AA-01438
- https://security.FreeBSD.org/advisories/FreeBSD-SA-16:34.bind.asc
- https://security.gentoo.org/glsa/201701-26
- https://security.netapp.com/advisory/ntap-20180926-0005/
- http://rhn.redhat.com/errata/RHSA-2016-2141.html
- http://rhn.redhat.com/errata/RHSA-2016-2142.html
- http://rhn.redhat.com/errata/RHSA-2016-2615.html
- http://rhn.redhat.com/errata/RHSA-2016-2871.html
- http://www.debian.org/security/2016/dsa-3703
- http://www.securityfocus.com/bid/94067
- http://www.securitytracker.com/id/1037156
- https://access.redhat.com/errata/RHSA-2017:1583
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05381687
- https://kb.isc.org/article/AA-01434
- https://kb.isc.org/article/AA-01435
- https://kb.isc.org/article/AA-01436
- https://kb.isc.org/article/AA-01437
- https://kb.isc.org/article/AA-01438
- https://security.FreeBSD.org/advisories/FreeBSD-SA-16:34.bind.asc
- https://security.gentoo.org/glsa/201701-26
- https://security.netapp.com/advisory/ntap-20180926-0005/
Closed bugs
bind: Необходимо обеспечить совместимость службы с systemd
[DNS Amplification Attacks] Включить поддержку DNS RRL (доступно, начиная с 9.9.4 и 9.10.x)
[Feature Request] Собрать bind с опцией --enable-fetchlimit