Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2015-1443

Опубликовано: 20 июл. 2015
Источник: oracle-oval
Платформа: Oracle Linux 7

Описание

ELSA-2015-1443: bind security update (IMPORTANT)

[32:9.9.4-18.2]

  • Fix CVE-2015-4620

Обновленные пакеты

Oracle Linux 7

Oracle Linux x86_64

bind

9.9.4-18.el7_1.2

bind-chroot

9.9.4-18.el7_1.2

bind-devel

9.9.4-18.el7_1.2

bind-libs

9.9.4-18.el7_1.2

bind-libs-lite

9.9.4-18.el7_1.2

bind-license

9.9.4-18.el7_1.2

bind-lite-devel

9.9.4-18.el7_1.2

bind-sdb

9.9.4-18.el7_1.2

bind-sdb-chroot

9.9.4-18.el7_1.2

bind-utils

9.9.4-18.el7_1.2

Связанные CVE

Связанные уязвимости

ubuntu
около 10 лет назад

name.c in named in ISC BIND 9.7.x through 9.9.x before 9.9.7-P1 and 9.10.x before 9.10.2-P2, when configured as a recursive resolver with DNSSEC validation, allows remote attackers to cause a denial of service (REQUIRE assertion failure and daemon exit) by constructing crafted zone data and then making a query for a name in that zone.

redhat
около 10 лет назад

name.c in named in ISC BIND 9.7.x through 9.9.x before 9.9.7-P1 and 9.10.x before 9.10.2-P2, when configured as a recursive resolver with DNSSEC validation, allows remote attackers to cause a denial of service (REQUIRE assertion failure and daemon exit) by constructing crafted zone data and then making a query for a name in that zone.

nvd
около 10 лет назад

name.c in named in ISC BIND 9.7.x through 9.9.x before 9.9.7-P1 and 9.10.x before 9.10.2-P2, when configured as a recursive resolver with DNSSEC validation, allows remote attackers to cause a denial of service (REQUIRE assertion failure and daemon exit) by constructing crafted zone data and then making a query for a name in that zone.

debian
около 10 лет назад

name.c in named in ISC BIND 9.7.x through 9.9.x before 9.9.7-P1 and 9. ...

github
больше 3 лет назад

name.c in named in ISC BIND 9.7.x through 9.9.x before 9.9.7-P1 and 9.10.x before 9.10.2-P2, when configured as a recursive resolver with DNSSEC validation, allows remote attackers to cause a denial of service (REQUIRE assertion failure and daemon exit) by constructing crafted zone data and then making a query for a name in that zone.