Isc

Bind

181 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 20.04%
  • Published 25.11.2009 16:30:00
  • Last modified 09.04.2025 00:30:58

Unspecified vulnerability in ISC BIND 9.0.x through 9.3.x, 9.4 before 9.4.3-P4, 9.5 before 9.5.2-P1, 9.6 before 9.6.1-P2, and 9.7 beta before 9.7.0b3, with DNSSEC validation enabled and checking disabled (CD), allows remote attackers to conduct DNS c...

  • EPSS 40.55%
  • Published 29.07.2009 17:30:00
  • Last modified 09.04.2025 00:30:58

The dns_db_findrdataset function in db.c in named in ISC BIND 9.4 before 9.4.3-P3, 9.5 before 9.5.1-P3, and 9.6 before 9.6.1-P1, when configured as a master server, allows remote attackers to cause a denial of service (assertion failure and daemon ex...

  • EPSS 0.39%
  • Published 26.01.2009 15:30:04
  • Last modified 09.04.2025 00:30:58

Internet Systems Consortium (ISC) BIND 9.6.0 and earlier does not properly check the return value from the OpenSSL EVP_VerifyFinal function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature...

  • EPSS 5.03%
  • Published 07.01.2009 17:30:00
  • Last modified 09.04.2025 00:30:58

BIND 9.6.0, 9.5.1, 9.5.0, 9.4.3, and earlier does not properly check the return value from the OpenSSL DSA_verify function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature, a similar vulne...

  • EPSS 26.7%
  • Published 22.09.2008 18:52:13
  • Last modified 09.04.2025 00:30:58

Unspecified vulnerability in ISC BIND 9.3.5-P2-W1, 9.4.2-P2-W1, and 9.5.0-P2-W1 on Windows allows remote attackers to cause a denial of service (UDP client handler termination) via unknown vectors.

  • EPSS 86.32%
  • Published 08.07.2008 23:41:00
  • Last modified 09.04.2025 00:30:58

The DNS protocol, as implemented in (1) BIND 8 and 9 before 9.5.0-P1, 9.4.2-P1, and 9.3.5-P1; (2) Microsoft DNS in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2; and other implementations allow remote attackers to spoof DNS traffic vi...

  • EPSS 1.62%
  • Published 16.01.2008 02:00:00
  • Last modified 09.04.2025 00:30:58

Off-by-one error in the inet_network function in libbind in ISC BIND 9.4.2 and earlier, as used in libc in FreeBSD 6.2 through 7.0-PRERELEASE, allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code...

  • EPSS 16.75%
  • Published 12.09.2007 01:17:00
  • Last modified 09.04.2025 00:30:58

The (1) NSID_SHUFFLE_ONLY and (2) NSID_USE_POOL PRNG algorithms in ISC BIND 8 before 8.4.7-P1 generate predictable DNS query identifiers when sending outgoing queries such as NOTIFY messages when answering questions as a resolver, which allows remote...

  • EPSS 3.21%
  • Published 24.07.2007 17:30:00
  • Last modified 09.04.2025 00:30:58

The default access control lists (ACL) in ISC BIND 9.4.0, 9.4.1, and 9.5.0a1 through 9.5.0a5 do not set the allow-recursion and allow-query-cache ACLs, which allows remote attackers to make recursive queries and query the cache.

  • EPSS 15.04%
  • Published 24.07.2007 17:30:00
  • Last modified 09.04.2025 00:30:58

ISC BIND 9 through 9.5.0a5 uses a weak random number generator during generation of DNS query ids when answering resolver questions or sending NOTIFY messages to slave name servers, which makes it easier for remote attackers to guess the next query i...