Anfälligkeitssuche        Suche in 211766 CVE Beschreibungen
und 97459 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.1.4.2015.2340.1
Kategorie:SuSE Local Security Checks
Titel:SUSE: Security Advisory (SUSE-SU-2015:2340-1)
Zusammenfassung:The remote host is missing an update for the 'bind' package(s) announced via the SUSE-SU-2015:2340-1 advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'bind' package(s) announced via the SUSE-SU-2015:2340-1 advisory.

Vulnerability Insight:
This update fixes the following security issue:
- CVE-2015-8000: Fix remote denial of service by misparsing incoming
responses (bsc#958861).
It also fixes a bug:
- Fix a regression in caching entries with a TTL of 0 (bsc#923281).

Affected Software/OS:
'bind' package(s) on SUSE Linux Enterprise Software Development Kit 11-SP4, SUSE Linux Enterprise Software Development Kit 11-SP3, SUSE Linux Enterprise Server for VMWare 11-SP3, SUSE Linux Enterprise Server 11-SP4, SUSE Linux Enterprise Server 11-SP3, SUSE Linux Enterprise Server 11-SP2, SUSE Linux Enterprise Desktop 11-SP4, SUSE Linux Enterprise Desktop 11-SP3, SUSE Linux Enterprise Debuginfo 11-SP4, SUSE Linux Enterprise Debuginfo 11-SP3, SUSE Linux Enterprise Debuginfo 11-SP2

Solution:
Please install the updated package(s).

CVSS Score:
5.0

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:P

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2015-8000
BugTraq ID: 79349
http://www.securityfocus.com/bid/79349
Debian Security Information: DSA-3420 (Google Search)
http://www.debian.org/security/2015/dsa-3420
http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174145.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174252.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174143.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174520.html
HPdes Security Advisory: HPSBUX03552
http://marc.info/?l=bugtraq&m=145680832702035&w=2
HPdes Security Advisory: SSRT102983
http://packetstormsecurity.com/files/134882/FreeBSD-Security-Advisory-BIND-Denial-Of-Service.html
RedHat Security Advisories: RHSA-2015:2655
http://rhn.redhat.com/errata/RHSA-2015-2655.html
RedHat Security Advisories: RHSA-2015:2656
http://rhn.redhat.com/errata/RHSA-2015-2656.html
RedHat Security Advisories: RHSA-2015:2658
http://rhn.redhat.com/errata/RHSA-2015-2658.html
RedHat Security Advisories: RHSA-2016:0078
http://rhn.redhat.com/errata/RHSA-2016-0078.html
RedHat Security Advisories: RHSA-2016:0079
http://rhn.redhat.com/errata/RHSA-2016-0079.html
http://www.securitytracker.com/id/1034418
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.539966
SuSE Security Announcement: SUSE-SU-2015:2340 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00027.html
SuSE Security Announcement: SUSE-SU-2015:2341 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00028.html
SuSE Security Announcement: SUSE-SU-2015:2359 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00034.html
SuSE Security Announcement: SUSE-SU-2016:0227 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00033.html
SuSE Security Announcement: openSUSE-SU-2015:2364 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00035.html
SuSE Security Announcement: openSUSE-SU-2015:2365 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00036.html
SuSE Security Announcement: openSUSE-SU-2015:2391 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00042.html
http://www.ubuntu.com/usn/USN-2837-1
CopyrightCopyright (C) 2021 Greenbone Networks GmbH

Dies ist nur einer von 97459 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2021 E-Soft Inc. Alle Rechte vorbehalten.