Логотип exploitDog
bind:CVE-2001-0497
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2001-0497

Количество 2

Количество 2

nvd логотип

CVE-2001-0497

больше 24 лет назад

dnskeygen in BIND 8.2.4 and earlier, and dnssec-keygen in BIND 9.1.2 and earlier, set insecure permissions for a HMAC-MD5 shared secret key file used for DNS Transactional Signatures (TSIG), which allows attackers to obtain the keys and perform dynamic DNS updates.

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-r698-fc6p-rp6g

почти 4 года назад

dnskeygen in BIND 8.2.4 and earlier, and dnssec-keygen in BIND 9.1.2 and earlier, set insecure permissions for a HMAC-MD5 shared secret key file used for DNS Transactional Signatures (TSIG), which allows attackers to obtain the keys and perform dynamic DNS updates.

CVSS3: 7.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2001-0497

dnskeygen in BIND 8.2.4 and earlier, and dnssec-keygen in BIND 9.1.2 and earlier, set insecure permissions for a HMAC-MD5 shared secret key file used for DNS Transactional Signatures (TSIG), which allows attackers to obtain the keys and perform dynamic DNS updates.

CVSS3: 7.8
0%
Низкий
больше 24 лет назад
github логотип
GHSA-r698-fc6p-rp6g

dnskeygen in BIND 8.2.4 and earlier, and dnssec-keygen in BIND 9.1.2 and earlier, set insecure permissions for a HMAC-MD5 shared secret key file used for DNS Transactional Signatures (TSIG), which allows attackers to obtain the keys and perform dynamic DNS updates.

CVSS3: 7.8
0%
Низкий
почти 4 года назад

Уязвимостей на страницу