Isc

Bind

183 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 19.52%
  • Veröffentlicht 16.01.2019 20:29:00
  • Zuletzt bearbeitet 21.11.2024 03:24:55

If named is configured to use Response Policy Zones (RPZ) an error processing some rule types can lead to a condition where BIND will endlessly loop while handling a query. Affects BIND 9.9.10, 9.10.5, 9.11.0->9.11.1, 9.9.10-S1, 9.10.5-S1.

Exploit
  • EPSS 3.1%
  • Veröffentlicht 16.01.2019 20:29:00
  • Zuletzt bearbeitet 21.11.2024 03:24:55

The BIND installer on Windows uses an unquoted service path which can enable a local user to achieve privilege escalation if the host file system permissions allow this. Affects BIND 9.2.6-P2->9.2.9, 9.3.2-P1->9.3.6, 9.4.0->9.8.8, 9.9.0->9.9.10, 9.10...

  • EPSS 4.95%
  • Veröffentlicht 16.01.2019 20:29:00
  • Zuletzt bearbeitet 21.11.2024 03:24:55

An attacker who is able to send and receive messages to an authoritative DNS server and who has knowledge of a valid TSIG key name may be able to circumvent TSIG authentication of AXFR requests via a carefully constructed request packet. A server tha...

  • EPSS 26.93%
  • Veröffentlicht 16.01.2019 20:29:00
  • Zuletzt bearbeitet 21.11.2024 03:24:55

An attacker who is able to send and receive messages to an authoritative DNS server and who has knowledge of a valid TSIG key name for the zone and service being targeted may be able to manipulate BIND into accepting an unauthorized dynamic update. A...

  • EPSS 10.37%
  • Veröffentlicht 16.01.2019 20:29:00
  • Zuletzt bearbeitet 21.11.2024 03:24:55

BIND was improperly sequencing cleanup operations on upstream recursion fetch contexts, leading in some cases to a use-after-free error that can trigger an assertion failure and crash in named. Affects BIND 9.0.0 to 9.8.x, 9.9.0 to 9.9.11, 9.10.0 to ...

  • EPSS 6.4%
  • Veröffentlicht 16.01.2019 20:29:00
  • Zuletzt bearbeitet 21.11.2024 04:09:16

While handling a particular type of malformed packet BIND erroneously selects a SERVFAIL rcode instead of a FORMERR rcode. If the receiving view has the SERVFAIL cache feature enabled, this can trigger an assertion failure in badcache.c when the requ...

  • EPSS 42.91%
  • Veröffentlicht 16.01.2019 20:29:00
  • Zuletzt bearbeitet 21.11.2024 04:09:16

An error in zone database reference counting can lead to an assertion failure if a server which is running an affected version of BIND attempts several transfers of a slave zone in quick succession. This defect could be deliberately exercised by an a...

  • EPSS 1.19%
  • Veröffentlicht 16.01.2019 20:29:00
  • Zuletzt bearbeitet 21.11.2024 04:09:17

A problem with the implementation of the new serve-stale feature in BIND 9.12 can lead to an assertion failure in rbtdb.c, even when stale-answer-enable is off. Additionally, problematic interaction between the serve-stale feature and NSEC aggressive...

  • EPSS 2.39%
  • Veröffentlicht 16.01.2019 20:29:00
  • Zuletzt bearbeitet 21.11.2024 04:09:17

Change #4777 (introduced in October 2017) introduced an unforeseen issue in releases which were issued after that date, affecting which clients are permitted to make recursive queries to a BIND nameserver. The intended (and documented) behavior is th...

  • EPSS 68.09%
  • Veröffentlicht 12.01.2017 06:59:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

named in ISC BIND 9.x before 9.9.9-P5, 9.10.x before 9.10.4-P5, and 9.11.x before 9.11.0-P2 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a malformed response to an RTYPE ANY query.