diff options
author | feld <feld@FreeBSD.org> | 2015-07-29 04:23:36 +0800 |
---|---|---|
committer | feld <feld@FreeBSD.org> | 2015-07-29 04:23:36 +0800 |
commit | 1580d72e1463e6ea8623fd8990de1f791420b2a4 (patch) | |
tree | 50acc5d25257b701d35c073db9c000702d1ceb64 /security | |
parent | 35e022ae6e8c1d8fd7a8be60816e849366388cb0 (diff) | |
download | freebsd-ports-gnome-1580d72e1463e6ea8623fd8990de1f791420b2a4.tar.gz freebsd-ports-gnome-1580d72e1463e6ea8623fd8990de1f791420b2a4.tar.zst freebsd-ports-gnome-1580d72e1463e6ea8623fd8990de1f791420b2a4.zip |
Document bind CVE
Security: CVE-2015-5477
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 43 |
1 files changed, 43 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index d08e465408d3..b99196bfa028 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -58,6 +58,49 @@ Notes: --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="731cdeaa-3564-11e5-9970-14dae9d210b8"> + <topic>bind -- denial of service vulnerability</topic> + <affects> + <package> + <name>bind910</name> + <range><lt>9.10.2P3</lt></range> + </package> + <package> + <name>bind99</name> + <range><lt>9.9.7P2</lt></range> + </package> + <package> + <name>bind910-base</name> + <name>bind99-base</name> + <range><gt>0</gt></range> + </package> + <package> + <name>FreeBSD</name> + <range><gt>9.3</gt><le>9.3_20</le></range> + <range><gt>8.4</gt><le>8.4_34</le></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>ISC reports:</p> + <blockquote cite="https://kb.isc.org/article/AA-01272/"> + <p>An error in the handling of TKEY queries can be exploited + by an attacker for use as a denial-of-service vector, as a constructed + packet can use the defect to trigger a REQUIRE assertion failure, + causing BIND to exit.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2015-5477</cvename> + <url>https://kb.isc.org/article/AA-01272/</url> + </references> + <dates> + <discovery>2015-07-21</discovery> + <entry>2015-07-28</entry> + </dates> + </vuln> + <vuln vid="5b74a5bc-348f-11e5-ba05-c80aa9043978"> <topic>OpenSSH -- MaxAuthTries limit bypass via duplicates in KbdInteractiveDevices</topic> <affects> |