Isc

Bind

181 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 5.23%
  • Published 16.01.2019 20:29:00
  • Last modified 21.11.2024 03:24:55

An attacker who is able to send and receive messages to an authoritative DNS server and who has knowledge of a valid TSIG key name may be able to circumvent TSIG authentication of AXFR requests via a carefully constructed request packet. A server tha...

  • EPSS 23.88%
  • Published 16.01.2019 20:29:00
  • Last modified 21.11.2024 03:24:55

An attacker who is able to send and receive messages to an authoritative DNS server and who has knowledge of a valid TSIG key name for the zone and service being targeted may be able to manipulate BIND into accepting an unauthorized dynamic update. A...

  • EPSS 5.77%
  • Published 16.01.2019 20:29:00
  • Last modified 21.11.2024 03:24:55

BIND was improperly sequencing cleanup operations on upstream recursion fetch contexts, leading in some cases to a use-after-free error that can trigger an assertion failure and crash in named. Affects BIND 9.0.0 to 9.8.x, 9.9.0 to 9.9.11, 9.10.0 to ...

  • EPSS 8.7%
  • Published 16.01.2019 20:29:00
  • Last modified 21.11.2024 04:09:16

While handling a particular type of malformed packet BIND erroneously selects a SERVFAIL rcode instead of a FORMERR rcode. If the receiving view has the SERVFAIL cache feature enabled, this can trigger an assertion failure in badcache.c when the requ...

  • EPSS 44.16%
  • Published 16.01.2019 20:29:00
  • Last modified 21.11.2024 04:09:16

An error in zone database reference counting can lead to an assertion failure if a server which is running an affected version of BIND attempts several transfers of a slave zone in quick succession. This defect could be deliberately exercised by an a...

  • EPSS 1.26%
  • Published 16.01.2019 20:29:00
  • Last modified 21.11.2024 04:09:17

A problem with the implementation of the new serve-stale feature in BIND 9.12 can lead to an assertion failure in rbtdb.c, even when stale-answer-enable is off. Additionally, problematic interaction between the serve-stale feature and NSEC aggressive...

  • EPSS 2.18%
  • Published 16.01.2019 20:29:00
  • Last modified 21.11.2024 04:09:17

Change #4777 (introduced in October 2017) introduced an unforeseen issue in releases which were issued after that date, affecting which clients are permitted to make recursive queries to a BIND nameserver. The intended (and documented) behavior is th...

  • EPSS 58.07%
  • Published 12.01.2017 06:59:00
  • Last modified 20.04.2025 01:37:25

named in ISC BIND 9.x before 9.9.9-P5, 9.10.x before 9.10.4-P5, and 9.11.x before 9.11.0-P2 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a malformed response to an RTYPE ANY query.

  • EPSS 52.54%
  • Published 12.01.2017 06:59:00
  • Last modified 20.04.2025 01:37:25

named in ISC BIND 9.9.9-P4, 9.9.9-S6, 9.10.4-P4, and 9.11.0-P1 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a response containing an inconsistency among the DNSSEC-related RRsets.

  • EPSS 53.18%
  • Published 12.01.2017 06:59:00
  • Last modified 20.04.2025 01:37:25

named in ISC BIND 9.x before 9.9.9-P5, 9.10.x before 9.10.4-P5, and 9.11.x before 9.11.0-P2 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a crafted DS resource record in an answer.