Debian

Debian Linux

9213 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 37.76%
  • Published 16.01.2019 20:29:00
  • Last modified 21.11.2024 03:24:54

A query with a specific set of characteristics could cause a server using DNS64 to encounter an assertion failure and terminate. An attacker could deliberately construct a query, enabling denial-of-service against a server if it was configured to use...

  • EPSS 34.31%
  • Published 16.01.2019 20:29:00
  • Last modified 21.11.2024 03:24:54

Mistaken assumptions about the ordering of records in the answer section of a response containing CNAME or DNAME resource records could lead to a situation in which named would exit with an assertion failure when processing a response in which record...

  • EPSS 18.27%
  • Published 16.01.2019 20:29:00
  • Last modified 21.11.2024 03:24:54

named contains a feature which allows operators to issue commands to a running server by communicating with the server process over a control channel, using a utility program such as rndc. A regression introduced in a recent feature change has create...

  • EPSS 3.7%
  • Published 16.01.2019 20:29:00
  • Last modified 21.11.2024 03:24:55

An attacker who is able to send and receive messages to an authoritative DNS server and who has knowledge of a valid TSIG key name may be able to circumvent TSIG authentication of AXFR requests via a carefully constructed request packet. A server tha...

  • EPSS 23.55%
  • Published 16.01.2019 20:29:00
  • Last modified 21.11.2024 03:24:55

An attacker who is able to send and receive messages to an authoritative DNS server and who has knowledge of a valid TSIG key name for the zone and service being targeted may be able to manipulate BIND into accepting an unauthorized dynamic update. A...

  • EPSS 18.13%
  • Published 16.01.2019 20:29:00
  • Last modified 21.11.2024 03:24:55

A vulnerability stemming from failure to properly clean up closed OMAPI connections can lead to exhaustion of the pool of socket descriptors available to the DHCP server. Affects ISC DHCP 4.1.0 to 4.1-ESV-R15, 4.2.0 to 4.2.8, 4.3.0 to 4.3.6. Older ve...

  • EPSS 10.13%
  • Published 16.01.2019 20:29:00
  • Last modified 21.11.2024 03:24:55

BIND was improperly sequencing cleanup operations on upstream recursion fetch contexts, leading in some cases to a use-after-free error that can trigger an assertion failure and crash in named. Affects BIND 9.0.0 to 9.8.x, 9.9.0 to 9.9.11, 9.10.0 to ...

  • EPSS 29.14%
  • Published 16.01.2019 20:29:00
  • Last modified 25.04.2025 23:15:15

A malicious client which is allowed to send very large amounts of traffic (billions of packets) to a DHCP server can eventually overflow a 32-bit reference counter, potentially causing dhcpd to crash. Affects ISC DHCP 4.1.0 -> 4.1-ESV-R15, 4.2.0 -> 4...

  • EPSS 0.21%
  • Published 16.01.2019 19:30:35
  • Last modified 21.11.2024 04:41:03

Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.6.42 and prior, 5.7.24 and prior and 8.0.13 and prior. Easily exploitable vulnerability allows low privileged at...

  • EPSS 0.12%
  • Published 16.01.2019 19:30:35
  • Last modified 21.11.2024 04:41:04

Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.6.42 and prior, 5.7.24 and prior and 8.0.13 and prior. Easily exploitable vulnerability allows high privileged attacke...