Isc

Bind

181 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 20.04%
  • Veröffentlicht 25.11.2009 16:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Unspecified vulnerability in ISC BIND 9.0.x through 9.3.x, 9.4 before 9.4.3-P4, 9.5 before 9.5.2-P1, 9.6 before 9.6.1-P2, and 9.7 beta before 9.7.0b3, with DNSSEC validation enabled and checking disabled (CD), allows remote attackers to conduct DNS c...

  • EPSS 40.55%
  • Veröffentlicht 29.07.2009 17:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The dns_db_findrdataset function in db.c in named in ISC BIND 9.4 before 9.4.3-P3, 9.5 before 9.5.1-P3, and 9.6 before 9.6.1-P1, when configured as a master server, allows remote attackers to cause a denial of service (assertion failure and daemon ex...

  • EPSS 0.39%
  • Veröffentlicht 26.01.2009 15:30:04
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Internet Systems Consortium (ISC) BIND 9.6.0 and earlier does not properly check the return value from the OpenSSL EVP_VerifyFinal function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature...

  • EPSS 5.03%
  • Veröffentlicht 07.01.2009 17:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

BIND 9.6.0, 9.5.1, 9.5.0, 9.4.3, and earlier does not properly check the return value from the OpenSSL DSA_verify function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature, a similar vulne...

  • EPSS 26.7%
  • Veröffentlicht 22.09.2008 18:52:13
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Unspecified vulnerability in ISC BIND 9.3.5-P2-W1, 9.4.2-P2-W1, and 9.5.0-P2-W1 on Windows allows remote attackers to cause a denial of service (UDP client handler termination) via unknown vectors.

  • EPSS 86.32%
  • Veröffentlicht 08.07.2008 23:41:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The DNS protocol, as implemented in (1) BIND 8 and 9 before 9.5.0-P1, 9.4.2-P1, and 9.3.5-P1; (2) Microsoft DNS in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2; and other implementations allow remote attackers to spoof DNS traffic vi...

  • EPSS 1.62%
  • Veröffentlicht 16.01.2008 02:00:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Off-by-one error in the inet_network function in libbind in ISC BIND 9.4.2 and earlier, as used in libc in FreeBSD 6.2 through 7.0-PRERELEASE, allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code...

  • EPSS 16.75%
  • Veröffentlicht 12.09.2007 01:17:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The (1) NSID_SHUFFLE_ONLY and (2) NSID_USE_POOL PRNG algorithms in ISC BIND 8 before 8.4.7-P1 generate predictable DNS query identifiers when sending outgoing queries such as NOTIFY messages when answering questions as a resolver, which allows remote...

  • EPSS 2.45%
  • Veröffentlicht 24.07.2007 17:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The default access control lists (ACL) in ISC BIND 9.4.0, 9.4.1, and 9.5.0a1 through 9.5.0a5 do not set the allow-recursion and allow-query-cache ACLs, which allows remote attackers to make recursive queries and query the cache.

  • EPSS 15.04%
  • Veröffentlicht 24.07.2007 17:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

ISC BIND 9 through 9.5.0a5 uses a weak random number generator during generation of DNS query ids when answering resolver questions or sending NOTIFY messages to slave name servers, which makes it easier for remote attackers to guess the next query i...