Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-hcwf-6ghh-6m6f

Опубликовано: 02 мая 2022
Источник: github
Github: Не прошло ревью

Описание

BIND 9.6.0, 9.5.1, 9.5.0, 9.4.3, and earlier does not properly check the return value from the OpenSSL DSA_verify function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature, a similar vulnerability to CVE-2008-5077.

BIND 9.6.0, 9.5.1, 9.5.0, 9.4.3, and earlier does not properly check the return value from the OpenSSL DSA_verify function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature, a similar vulnerability to CVE-2008-5077.

Ссылки

EPSS

Процентиль: 88%
0.03902
Низкий

Дефекты

CWE-287

Связанные уязвимости

ubuntu
больше 16 лет назад

BIND 9.6.0, 9.5.1, 9.5.0, 9.4.3, and earlier does not properly check the return value from the OpenSSL DSA_verify function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature, a similar vulnerability to CVE-2008-5077.

redhat
больше 16 лет назад

BIND 9.6.0, 9.5.1, 9.5.0, 9.4.3, and earlier does not properly check the return value from the OpenSSL DSA_verify function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature, a similar vulnerability to CVE-2008-5077.

nvd
больше 16 лет назад

BIND 9.6.0, 9.5.1, 9.5.0, 9.4.3, and earlier does not properly check the return value from the OpenSSL DSA_verify function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature, a similar vulnerability to CVE-2008-5077.

debian
больше 16 лет назад

BIND 9.6.0, 9.5.1, 9.5.0, 9.4.3, and earlier does not properly check t ...

oracle-oval
больше 16 лет назад

ELSA-2009-0020: bind security update (MODERATE)

EPSS

Процентиль: 88%
0.03902
Низкий

Дефекты

CWE-287