![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.122582 |
Categoría: | Oracle Linux Local Security Checks |
Título: | Oracle: Security Advisory (ELSA-2008-0300) |
Resumen: | The remote host is missing an update for the 'bind' package(s) announced via the ELSA-2008-0300 advisory. |
Descripción: | Summary: The remote host is missing an update for the 'bind' package(s) announced via the ELSA-2008-0300 advisory. Vulnerability Insight: [30:9.3.4-6.P1] - final 5.2 version - minor changes in initscript - improved patches for #250744 and #250901 [30:9.3.4-5.P1] - improved patch to handle D-BUS races (#240876) - updated named.root zone to affect root IPv6 migration [30:9.3.4-4.P1] - improved fix for #253537, posttrans script is now used - do not call restorecon on chroot/proc [30:9.3.4-3.P1] - CVE-2008-0122 (small buffer overflow in inet_network) [30:9.3.4-2.P1] - ship /usr/include/dst/gssapi.h file [30:9.3.4-1.P1] - CVE-2007-6283 (#419421) [30:9.3.4-0.9.2.P1] - added GSS-TSIG support to nsupdate (#251528) [30:9.3.4-0.9.1.P1] - updated L.ROOT-SERVERS.NET address in lib/dns/rootns.c file [30:9.3.4-0.9.P1] - fixed building of SDB stuff (#240788) - fixed race condition during DBUS initialization (#240876) - initscript LSD standardization (#242734) [command (#247148)] - fixed wrong perms of named's ldap schema (#250118) - suppressed errors from chroot's specfile scripts (#252334) - fixed /dev/random SELinux labelling - added configtest to usage report from named initscript (#250744) - fixed rndc stop return value handler (#250901) - fixed named.log sync in bind-chroot-admin (#247486) - rebased to latest 9.3 maintenance release (9.3.4-P1, #353741) - updated named.root file (new L.ROOT-SERVERS.NET, #363531) - added GSS-TSIG support to named (#251528) - dropped patches (upstream) - bind-9.3.4.P1-query-id.patch - bind-9.3.3rc2-dbus-0.6.patch - bind-9.3.4-validator.patch - bind-9.3.4-nqueries.patch - updated patches - bind-9.3.2-tmpfile.patch Affected Software/OS: 'bind' package(s) on Oracle Linux 5. Solution: Please install the updated package(s). CVSS Score: 10.0 CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2007-6283 https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00587.html https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00671.html https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9977 http://www.redhat.com/support/errata/RHSA-2008-0300.html http://secunia.com/advisories/28180 http://secunia.com/advisories/30313 Common Vulnerability Exposure (CVE) ID: CVE-2008-0122 BugTraq ID: 27283 http://www.securityfocus.com/bid/27283 Bugtraq: 20080124 rPSA-2008-0029-1 bind bind-utils (Google Search) http://www.securityfocus.com/archive/1/487000/100/0/threaded CERT/CC vulnerability note: VU#203611 http://www.kb.cert.org/vuls/id/203611 https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00781.html https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00782.html FreeBSD Security Advisory: FreeBSD-SA-08:02 http://security.freebsd.org/advisories/FreeBSD-SA-08:02.libc.asc https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10190 http://www.securitytracker.com/id?1019189 http://secunia.com/advisories/28367 http://secunia.com/advisories/28429 http://secunia.com/advisories/28487 http://secunia.com/advisories/28579 http://secunia.com/advisories/29161 http://secunia.com/advisories/29323 http://secunia.com/advisories/30538 http://secunia.com/advisories/30718 http://sunsolve.sun.com/search/document.do?assetkey=1-26-238493-1 SuSE Security Announcement: SUSE-SR:2008:006 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00004.html http://www.vupen.com/english/advisories/2008/0193 http://www.vupen.com/english/advisories/2008/0703 http://www.vupen.com/english/advisories/2008/1743/references XForce ISS Database: freebsd-inetnetwork-bo(39670) https://exchange.xforce.ibmcloud.com/vulnerabilities/39670 |
Copyright | Copyright (C) 2015 Greenbone AG |
Esta es sólo una de 146377 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |