Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 146377 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.122582
Kategorie:Oracle Linux Local Security Checks
Titel:Oracle: Security Advisory (ELSA-2008-0300)
Zusammenfassung:The remote host is missing an update for the 'bind' package(s) announced via the ELSA-2008-0300 advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'bind' package(s) announced via the ELSA-2008-0300 advisory.

Vulnerability Insight:
[30:9.3.4-6.P1]
- final 5.2 version
- minor changes in initscript
- improved patches for #250744 and #250901

[30:9.3.4-5.P1]
- improved patch to handle D-BUS races (#240876)
- updated named.root zone to affect root IPv6 migration

[30:9.3.4-4.P1]
- improved fix for #253537, posttrans script is now used
- do not call restorecon on chroot/proc

[30:9.3.4-3.P1]
- CVE-2008-0122 (small buffer overflow in inet_network)

[30:9.3.4-2.P1]
- ship /usr/include/dst/gssapi.h file

[30:9.3.4-1.P1]
- CVE-2007-6283 (#419421)

[30:9.3.4-0.9.2.P1]
- added GSS-TSIG support to nsupdate (#251528)

[30:9.3.4-0.9.1.P1]
- updated L.ROOT-SERVERS.NET address in lib/dns/rootns.c file

[30:9.3.4-0.9.P1]
- fixed building of SDB stuff (#240788)
- fixed race condition during DBUS initialization (#240876)
- initscript LSD standardization (#242734)
[command (#247148)]
- fixed wrong perms of named's ldap schema (#250118)
- suppressed errors from chroot's specfile scripts (#252334)
- fixed /dev/random SELinux labelling
- added configtest to usage report from named initscript (#250744)
- fixed rndc stop return value handler (#250901)
- fixed named.log sync in bind-chroot-admin (#247486)
- rebased to latest 9.3 maintenance release (9.3.4-P1, #353741)
- updated named.root file (new L.ROOT-SERVERS.NET, #363531)
- added GSS-TSIG support to named (#251528)
- dropped patches (upstream)
- bind-9.3.4.P1-query-id.patch
- bind-9.3.3rc2-dbus-0.6.patch
- bind-9.3.4-validator.patch
- bind-9.3.4-nqueries.patch
- updated patches
- bind-9.3.2-tmpfile.patch

Affected Software/OS:
'bind' package(s) on Oracle Linux 5.

Solution:
Please install the updated package(s).

CVSS Score:
10.0

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2007-6283
https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00587.html
https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00671.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9977
http://www.redhat.com/support/errata/RHSA-2008-0300.html
http://secunia.com/advisories/28180
http://secunia.com/advisories/30313
Common Vulnerability Exposure (CVE) ID: CVE-2008-0122
BugTraq ID: 27283
http://www.securityfocus.com/bid/27283
Bugtraq: 20080124 rPSA-2008-0029-1 bind bind-utils (Google Search)
http://www.securityfocus.com/archive/1/487000/100/0/threaded
CERT/CC vulnerability note: VU#203611
http://www.kb.cert.org/vuls/id/203611
https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00781.html
https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00782.html
FreeBSD Security Advisory: FreeBSD-SA-08:02
http://security.freebsd.org/advisories/FreeBSD-SA-08:02.libc.asc
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10190
http://www.securitytracker.com/id?1019189
http://secunia.com/advisories/28367
http://secunia.com/advisories/28429
http://secunia.com/advisories/28487
http://secunia.com/advisories/28579
http://secunia.com/advisories/29161
http://secunia.com/advisories/29323
http://secunia.com/advisories/30538
http://secunia.com/advisories/30718
http://sunsolve.sun.com/search/document.do?assetkey=1-26-238493-1
SuSE Security Announcement: SUSE-SR:2008:006 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00004.html
http://www.vupen.com/english/advisories/2008/0193
http://www.vupen.com/english/advisories/2008/0703
http://www.vupen.com/english/advisories/2008/1743/references
XForce ISS Database: freebsd-inetnetwork-bo(39670)
https://exchange.xforce.ibmcloud.com/vulnerabilities/39670
CopyrightCopyright (C) 2015 Greenbone AG

Dies ist nur einer von 146377 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.