Isc

Bind

184 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 7.09%
  • Veröffentlicht 02.02.2006 11:02:00
  • Zuletzt bearbeitet 16.04.2026 00:27:16

BIND 4 (BIND4) and BIND 8 (BIND8), if used as a target forwarder, allows remote attackers to gain privileged access via a "Kashpureff-style DNS cache corruption" attack.

  • EPSS 32.01%
  • Veröffentlicht 02.05.2005 04:00:00
  • Zuletzt bearbeitet 16.04.2026 00:27:16

Buffer overflow in the code for recursion and glue fetching in BIND 8.4.4 and 8.4.5 allows remote attackers to cause a denial of service (crash) via queries that trigger the overflow in the q_usedns array that tracks nameservers and addresses.

  • EPSS 6.64%
  • Veröffentlicht 02.05.2005 04:00:00
  • Zuletzt bearbeitet 16.04.2026 00:27:16

An "incorrect assumption" in the authvalidated validator function in BIND 9.3.0, when DNSSEC is enabled, allows remote attackers to cause a denial of service (named server exit) via crafted DNS packets that cause an internal consistency test (self-ch...

  • EPSS 29.9%
  • Veröffentlicht 15.12.2003 05:00:00
  • Zuletzt bearbeitet 16.04.2026 00:27:16

ISC BIND 8.3.x before 8.3.7, and 8.4.x before 8.4.3, allows remote attackers to poison the cache via a malicious name server that returns negative responses with a large TTL (time-to-live) value.

  • EPSS 3.34%
  • Veröffentlicht 31.12.2002 05:00:00
  • Zuletzt bearbeitet 16.04.2026 00:27:16

BIND 4 and BIND 8, when resolving recursive DNS queries for arbitrary hosts, allows remote attackers to conduct DNS cache poisoning via a birthday attack that uses a large number of open queries for the same resource record (RR) combined with spoofed...

  • EPSS 6.91%
  • Veröffentlicht 31.12.2002 05:00:00
  • Zuletzt bearbeitet 16.04.2026 00:27:16

The DNS resolver in unspecified versions of Fujitsu UXP/V, when resolving recursive DNS queries for arbitrary hosts, allows remote attackers to conduct DNS cache poisoning via a birthday attack that uses a large number of open queries for the same re...

  • EPSS 6.91%
  • Veröffentlicht 31.12.2002 05:00:00
  • Zuletzt bearbeitet 16.04.2026 00:27:16

The DNS resolver in unspecified versions of Infoblox DNS One, when resolving recursive DNS queries for arbitrary hosts, allows remote attackers to conduct DNS cache poisoning via a birthday attack that uses a large number of open queries for the same...

  • EPSS 21.85%
  • Veröffentlicht 29.11.2002 05:00:00
  • Zuletzt bearbeitet 16.04.2026 00:27:16

Buffer overflows in the DNS stub resolver library in ISC BIND 4.9.2 through 4.9.10, and other derived libraries such as BSD libc and GNU glibc, allow remote attackers to execute arbitrary code via DNS server responses that trigger the overflow in the...

  • EPSS 11.8%
  • Veröffentlicht 29.11.2002 05:00:00
  • Zuletzt bearbeitet 16.04.2026 00:27:16

Buffer overflow in named in BIND 4 versions 4.9.10 and earlier, and 8 versions 8.3.3 and earlier, allows remote attackers to execute arbitrary code via a certain DNS server response containing SIG resource records (RR).

  • EPSS 31.98%
  • Veröffentlicht 29.11.2002 05:00:00
  • Zuletzt bearbeitet 16.04.2026 00:27:16

BIND 8.3.x through 8.3.3 allows remote attackers to cause a denial of service (termination due to assertion failure) via a request for a subdomain that does not exist, with an OPT resource record with a large UDP payload size.