aboutsummaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
authorremko <remko@FreeBSD.org>2005-09-04 03:05:00 +0800
committerremko <remko@FreeBSD.org>2005-09-04 03:05:00 +0800
commitbcbd0261c0ed54fcbb187b3c0c1f4056d21db342 (patch)
tree5585df607055eb9a9658103a161a9b3b3429a9ce /security
parent0f16783aca65e7995c273fd83e8be697a26d552c (diff)
downloadfreebsd-ports-gnome-bcbd0261c0ed54fcbb187b3c0c1f4056d21db342.tar.gz
freebsd-ports-gnome-bcbd0261c0ed54fcbb187b3c0c1f4056d21db342.tar.zst
freebsd-ports-gnome-bcbd0261c0ed54fcbb187b3c0c1f4056d21db342.zip
Document bind9 -- denial of service.
Also merge the FreeBSD-SA-05:12.bind9 advisory in the entry. [1] Suggested by: simon [1] Reviewed by: simon
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml44
1 files changed, 44 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 49dc92fb062c..9445dac01f75 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -32,6 +32,50 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="30e4ed7b-1ca6-11da-bc01-000e0c2e438a">
+ <topic>bind9 -- denial of service</topic>
+ <affects>
+ <package>
+ <name>bind9</name>
+ <range><eq>9.3.0</eq></range>
+ </package>
+ <system>
+ <name>FreeBSD</name>
+ <range><ge>5.3</ge><lt>5.3_16</lt></range>
+ </system>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Problem description</p>
+ <p>A DNSSEC-related validator function in BIND 9.3.0 contains an
+ inappropriate internal consistency test. When this test is
+ triggered, named(8) will exit.</p>
+ <p>Impact</p>
+ <p>On systems with DNSSEC enabled, a remote attacker may be able
+ to inject a specially crafted packet that will cause the
+ internal consistency test to trigger, and named(8) to
+ terminate. As a result, the name server will no longer be
+ available to service requests.</p>
+ <p>Workaround</p>
+ <p>DNSSEC is not enabled by default, and the "dnssec-enable"
+ directive is not normally present. If DNSSEC has been
+ enabled, disable it by changing the "dnssec-enable" directive
+ to "dnssec-enable no;" in the named.conf(5) configuration
+ file.</p>
+ </body>
+ </description>
+ <references>
+ <certvu>938617</certvu>
+ <cvename>CAN-2005-0034</cvename>
+ <url>http://www.uniras.gov.uk/niscc/docs/al-20050125-00060.html?lang=en</url>
+ <url>http://www.isc.org/sw/bind/bind9.3.php#security</url>
+ </references>
+ <dates>
+ <discovery>2005-01-25</discovery>
+ <entry>2005-09-03</entry>
+ </dates>
+ </vuln>
+
<vuln vid="947f4b14-1c89-11da-bc01-000e0c2e438a">
<topic>bind -- buffer overrun vulnerability</topic>
<affects>