aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorwxs <wxs@FreeBSD.org>2009-08-01 22:25:45 +0800
committerwxs <wxs@FreeBSD.org>2009-08-01 22:25:45 +0800
commit9f142cb58eef25e8329888d495416820b4d233d8 (patch)
treeecb55e819105b2d1a4648fe1cec91aecab277b45
parent580e1fd4682e6b9da8b832ba2584eb76a193037c (diff)
downloadfreebsd-ports-gnome-9f142cb58eef25e8329888d495416820b4d233d8.tar.gz
freebsd-ports-gnome-9f142cb58eef25e8329888d495416820b4d233d8.tar.zst
freebsd-ports-gnome-9f142cb58eef25e8329888d495416820b4d233d8.zip
- White space fixes and correct the entry date in
vid 83725c91-7c7e-11de-9672-00e0815b8da8
-rw-r--r--security/vuxml/vuln.xml44
1 files changed, 22 insertions, 22 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 57c19c071a80..0755708a6d7c 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -38,11 +38,11 @@ Note: Please add new entries to the beginning of this file.
<topic>BIND -- Dynamic update message remote DoS</topic>
<affects>
<package>
- <name>bind9</name>
- <range><lt>9.3.6.1.1</lt></range>
+ <name>bind9</name>
+ <range><lt>9.3.6.1.1</lt></range>
</package>
<system>
- <name>FreeBSD</name>
+ <name>FreeBSD</name>
<range><ge>6.3</ge><lt>6.3_12</lt></range>
<range><ge>6.4</ge><lt>6.4_6</lt></range>
<range><ge>7.1</ge><lt>7.1_7</lt></range>
@@ -51,23 +51,23 @@ Note: Please add new entries to the beginning of this file.
</affects>
<description>
<body xmlns="http://www.w3.org/1999/xhtml">
- <h1>Problem Description:</h1>
- <p>When named(8) receives a specially crafted dynamic update
- message an internal assertion check is triggered which causes
- named(8) to exit.</p>
- <p>To trigger the problem, the dynamic update message must contains
- a record of type "ANY" and at least one resource record set (RRset)
- for this fully qualified domain name (FQDN) must exist on the
- server.</p>
- <h1>Impact:</h1>
- <p>An attacker which can send DNS requests to a nameserver can cause
- it to exit, thus creating a Denial of Service situation.</p>
- <h1>Workaround:</h1>
- <p>No generally applicable workaround is available, but some firewalls
- may be able to prevent nsupdate DNS packets from reaching the
- nameserver.</p>
- <p>NOTE WELL: Merely configuring named(8) to ignore dynamic updates
- is NOT sufficient to protect it from this vulnerability.</p>
+ <h1>Problem Description:</h1>
+ <p>When named(8) receives a specially crafted dynamic update
+ message an internal assertion check is triggered which causes
+ named(8) to exit.</p>
+ <p>To trigger the problem, the dynamic update message must contains
+ a record of type "ANY" and at least one resource record set (RRset)
+ for this fully qualified domain name (FQDN) must exist on the
+ server.</p>
+ <h1>Impact:</h1>
+ <p>An attacker which can send DNS requests to a nameserver can cause
+ it to exit, thus creating a Denial of Service situation.</p>
+ <h1>Workaround:</h1>
+ <p>No generally applicable workaround is available, but some firewalls
+ may be able to prevent nsupdate DNS packets from reaching the
+ nameserver.</p>
+ <p>NOTE WELL: Merely configuring named(8) to ignore dynamic updates
+ is NOT sufficient to protect it from this vulnerability.</p>
</body>
</description>
<references>
@@ -78,7 +78,7 @@ Note: Please add new entries to the beginning of this file.
</references>
<dates>
<discovery>2009-07-28</discovery>
- <entry>2009-07-29</entry>
+ <entry>2009-08-01</entry>
</dates>
</vuln>
@@ -1608,7 +1608,7 @@ Note: Please add new entries to the beginning of this file.
</description>
<references>
<freebsdsa>SA-09:08.openssl</freebsdsa>
- <cvename>CVE-2009-0590</cvename>
+ <cvename>CVE-2009-0590</cvename>
</references>
<dates>
<discovery>2009-03-25</discovery>