diff options
author | wxs <wxs@FreeBSD.org> | 2009-08-01 22:25:45 +0800 |
---|---|---|
committer | wxs <wxs@FreeBSD.org> | 2009-08-01 22:25:45 +0800 |
commit | 9f142cb58eef25e8329888d495416820b4d233d8 (patch) | |
tree | ecb55e819105b2d1a4648fe1cec91aecab277b45 | |
parent | 580e1fd4682e6b9da8b832ba2584eb76a193037c (diff) | |
download | freebsd-ports-gnome-9f142cb58eef25e8329888d495416820b4d233d8.tar.gz freebsd-ports-gnome-9f142cb58eef25e8329888d495416820b4d233d8.tar.zst freebsd-ports-gnome-9f142cb58eef25e8329888d495416820b4d233d8.zip |
- White space fixes and correct the entry date in
vid 83725c91-7c7e-11de-9672-00e0815b8da8
-rw-r--r-- | security/vuxml/vuln.xml | 44 |
1 files changed, 22 insertions, 22 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 57c19c071a80..0755708a6d7c 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -38,11 +38,11 @@ Note: Please add new entries to the beginning of this file. <topic>BIND -- Dynamic update message remote DoS</topic> <affects> <package> - <name>bind9</name> - <range><lt>9.3.6.1.1</lt></range> + <name>bind9</name> + <range><lt>9.3.6.1.1</lt></range> </package> <system> - <name>FreeBSD</name> + <name>FreeBSD</name> <range><ge>6.3</ge><lt>6.3_12</lt></range> <range><ge>6.4</ge><lt>6.4_6</lt></range> <range><ge>7.1</ge><lt>7.1_7</lt></range> @@ -51,23 +51,23 @@ Note: Please add new entries to the beginning of this file. </affects> <description> <body xmlns="http://www.w3.org/1999/xhtml"> - <h1>Problem Description:</h1> - <p>When named(8) receives a specially crafted dynamic update - message an internal assertion check is triggered which causes - named(8) to exit.</p> - <p>To trigger the problem, the dynamic update message must contains - a record of type "ANY" and at least one resource record set (RRset) - for this fully qualified domain name (FQDN) must exist on the - server.</p> - <h1>Impact:</h1> - <p>An attacker which can send DNS requests to a nameserver can cause - it to exit, thus creating a Denial of Service situation.</p> - <h1>Workaround:</h1> - <p>No generally applicable workaround is available, but some firewalls - may be able to prevent nsupdate DNS packets from reaching the - nameserver.</p> - <p>NOTE WELL: Merely configuring named(8) to ignore dynamic updates - is NOT sufficient to protect it from this vulnerability.</p> + <h1>Problem Description:</h1> + <p>When named(8) receives a specially crafted dynamic update + message an internal assertion check is triggered which causes + named(8) to exit.</p> + <p>To trigger the problem, the dynamic update message must contains + a record of type "ANY" and at least one resource record set (RRset) + for this fully qualified domain name (FQDN) must exist on the + server.</p> + <h1>Impact:</h1> + <p>An attacker which can send DNS requests to a nameserver can cause + it to exit, thus creating a Denial of Service situation.</p> + <h1>Workaround:</h1> + <p>No generally applicable workaround is available, but some firewalls + may be able to prevent nsupdate DNS packets from reaching the + nameserver.</p> + <p>NOTE WELL: Merely configuring named(8) to ignore dynamic updates + is NOT sufficient to protect it from this vulnerability.</p> </body> </description> <references> @@ -78,7 +78,7 @@ Note: Please add new entries to the beginning of this file. </references> <dates> <discovery>2009-07-28</discovery> - <entry>2009-07-29</entry> + <entry>2009-08-01</entry> </dates> </vuln> @@ -1608,7 +1608,7 @@ Note: Please add new entries to the beginning of this file. </description> <references> <freebsdsa>SA-09:08.openssl</freebsdsa> - <cvename>CVE-2009-0590</cvename> + <cvename>CVE-2009-0590</cvename> </references> <dates> <discovery>2009-03-25</discovery> |