Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2005-0034

Опубликовано: 02 мая 2005
Источник: debian
EPSS Низкий

Описание

An "incorrect assumption" in the authvalidated validator function in BIND 9.3.0, when DNSSEC is enabled, allows remote attackers to cause a denial of service (named server exit) via crafted DNS packets that cause an internal consistency test (self-check) to fail.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
bind9fixed1:9.3.1package
bind9not-affectedwoodypackage
bind9not-affectedsargepackage

Примечания

  • only affects bind9 9.3.0, sarge and woody have an earlier versions

EPSS

Процентиль: 91%
0.06639
Низкий

Связанные уязвимости

ubuntu
больше 20 лет назад

An "incorrect assumption" in the authvalidated validator function in BIND 9.3.0, when DNSSEC is enabled, allows remote attackers to cause a denial of service (named server exit) via crafted DNS packets that cause an internal consistency test (self-check) to fail.

nvd
больше 20 лет назад

An "incorrect assumption" in the authvalidated validator function in BIND 9.3.0, when DNSSEC is enabled, allows remote attackers to cause a denial of service (named server exit) via crafted DNS packets that cause an internal consistency test (self-check) to fail.

github
больше 3 лет назад

An "incorrect assumption" in the authvalidated validator function in BIND 9.3.0, when DNSSEC is enabled, allows remote attackers to cause a denial of service (named server exit) via crafted DNS packets that cause an internal consistency test (self-check) to fail.

EPSS

Процентиль: 91%
0.06639
Низкий