Anfälligkeitssuche        Suche in 219043 CVE Beschreibungen
und 99761 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.57395
Kategorie:Turbolinux Local Security Tests
Titel:Turbolinux TLSA-2006-27 (bind)
Zusammenfassung:NOSUMMARY
Beschreibung:Description:

The remote host is missing an update to bind
announced via advisory TLSA-2006-27.

Bind includes the named name server, which resolves host names to IP
addresses (and vice versa), and a resolver library (a set of routines
in a system library that provide the interface for programs to use when
accessing domain name services).

Bind may allow remote attackers to cause a denial of service.

The bind allows remote attackers to cause a denial of service.

Solution: Please use the turbopkg (zabom) tool to apply the update.
https://secure1.securityspace.com/smysecure/catid.html?in=TLSA-2006-27

Risk factor : Medium

CVSS Score:
5.0

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2006-4095
http://lists.apple.com/archives/security-announce/2007/May/msg00004.html
BugTraq ID: 19859
http://www.securityfocus.com/bid/19859
Bugtraq: 20060908 rPSA-2006-0166-1 bind bind-utils (Google Search)
http://www.securityfocus.com/archive/1/445600/100/0/threaded
CERT/CC vulnerability note: VU#915404
http://www.kb.cert.org/vuls/id/915404
Debian Security Information: DSA-1172 (Google Search)
http://www.us.debian.org/security/2006/dsa-1172
FreeBSD Security Advisory: FreeBSD-SA-06:20.bind
http://security.freebsd.org/advisories/FreeBSD-SA-06:20.bind.asc
http://security.gentoo.org/glsa/glsa-200609-11.xml
HPdes Security Advisory: HPSBTU02207
https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144
HPdes Security Advisory: SSRT061213
HPdes Security Advisory: SSRT061239
HPdes Security Advisory: SSRT071304
http://www.mandriva.com/security/advisories?name=MDKSA-2006:163
http://www.niscc.gov.uk/niscc/docs/re-20060905-00590.pdf?lang=en
OpenBSD Security Advisory: [3.9] 20060908 010: SECURITY FIX: September 8, 2006
http://www.openbsd.org/errata.html
http://www.openpkg.com/security/advisories/OpenPKG-SA-2006.019.html
http://securitytracker.com/id?1016794
http://secunia.com/advisories/21752
http://secunia.com/advisories/21786
http://secunia.com/advisories/21816
http://secunia.com/advisories/21818
http://secunia.com/advisories/21828
http://secunia.com/advisories/21835
http://secunia.com/advisories/21838
http://secunia.com/advisories/21912
http://secunia.com/advisories/21926
http://secunia.com/advisories/22298
http://secunia.com/advisories/24950
http://secunia.com/advisories/25402
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.481241
SuSE Security Announcement: SUSE-SR:2006:023 (Google Search)
http://www.novell.com/linux/security/advisories/2006_23_sr.html
SuSE Security Announcement: SUSE-SR:2006:024 (Google Search)
http://www.novell.com/linux/security/advisories/2006_24_sr.html
http://www.ubuntu.com/usn/usn-343-1
http://www.vupen.com/english/advisories/2006/3473
http://www.vupen.com/english/advisories/2007/1401
http://www.vupen.com/english/advisories/2007/1939
XForce ISS Database: bind-dnssec-rrset-dos(28745)
https://exchange.xforce.ibmcloud.com/vulnerabilities/28745
Common Vulnerability Exposure (CVE) ID: CVE-2006-4096
AIX APAR: IY89169
http://www-1.ibm.com/support/docview.wss?uid=isg1IY89169
AIX APAR: IY89178
http://www-1.ibm.com/support/docview.wss?uid=isg1IY89178
CERT/CC vulnerability note: VU#697164
http://www.kb.cert.org/vuls/id/697164
HPdes Security Advisory: HPSBOV03226
http://marc.info/?l=bugtraq&m=141879471518471&w=2
HPdes Security Advisory: SSRT101004
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9623
http://secunia.com/advisories/21790
http://www.vupen.com/english/advisories/2006/3511
XForce ISS Database: bind-recursive-insist-dos(28744)
https://exchange.xforce.ibmcloud.com/vulnerabilities/28744
CopyrightCopyright (c) 2006 E-Soft Inc. http://www.securityspace.com

Dies ist nur einer von 99761 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2024 E-Soft Inc. Alle Rechte vorbehalten.