Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
146377 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.122582
Categoría:Oracle Linux Local Security Checks
Título:Oracle: Security Advisory (ELSA-2008-0300)
Resumen:The remote host is missing an update for the 'bind' package(s) announced via the ELSA-2008-0300 advisory.
Descripción:Summary:
The remote host is missing an update for the 'bind' package(s) announced via the ELSA-2008-0300 advisory.

Vulnerability Insight:
[30:9.3.4-6.P1]
- final 5.2 version
- minor changes in initscript
- improved patches for #250744 and #250901

[30:9.3.4-5.P1]
- improved patch to handle D-BUS races (#240876)
- updated named.root zone to affect root IPv6 migration

[30:9.3.4-4.P1]
- improved fix for #253537, posttrans script is now used
- do not call restorecon on chroot/proc

[30:9.3.4-3.P1]
- CVE-2008-0122 (small buffer overflow in inet_network)

[30:9.3.4-2.P1]
- ship /usr/include/dst/gssapi.h file

[30:9.3.4-1.P1]
- CVE-2007-6283 (#419421)

[30:9.3.4-0.9.2.P1]
- added GSS-TSIG support to nsupdate (#251528)

[30:9.3.4-0.9.1.P1]
- updated L.ROOT-SERVERS.NET address in lib/dns/rootns.c file

[30:9.3.4-0.9.P1]
- fixed building of SDB stuff (#240788)
- fixed race condition during DBUS initialization (#240876)
- initscript LSD standardization (#242734)
[command (#247148)]
- fixed wrong perms of named's ldap schema (#250118)
- suppressed errors from chroot's specfile scripts (#252334)
- fixed /dev/random SELinux labelling
- added configtest to usage report from named initscript (#250744)
- fixed rndc stop return value handler (#250901)
- fixed named.log sync in bind-chroot-admin (#247486)
- rebased to latest 9.3 maintenance release (9.3.4-P1, #353741)
- updated named.root file (new L.ROOT-SERVERS.NET, #363531)
- added GSS-TSIG support to named (#251528)
- dropped patches (upstream)
- bind-9.3.4.P1-query-id.patch
- bind-9.3.3rc2-dbus-0.6.patch
- bind-9.3.4-validator.patch
- bind-9.3.4-nqueries.patch
- updated patches
- bind-9.3.2-tmpfile.patch

Affected Software/OS:
'bind' package(s) on Oracle Linux 5.

Solution:
Please install the updated package(s).

CVSS Score:
10.0

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2007-6283
https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00587.html
https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00671.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9977
http://www.redhat.com/support/errata/RHSA-2008-0300.html
http://secunia.com/advisories/28180
http://secunia.com/advisories/30313
Common Vulnerability Exposure (CVE) ID: CVE-2008-0122
BugTraq ID: 27283
http://www.securityfocus.com/bid/27283
Bugtraq: 20080124 rPSA-2008-0029-1 bind bind-utils (Google Search)
http://www.securityfocus.com/archive/1/487000/100/0/threaded
CERT/CC vulnerability note: VU#203611
http://www.kb.cert.org/vuls/id/203611
https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00781.html
https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00782.html
FreeBSD Security Advisory: FreeBSD-SA-08:02
http://security.freebsd.org/advisories/FreeBSD-SA-08:02.libc.asc
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10190
http://www.securitytracker.com/id?1019189
http://secunia.com/advisories/28367
http://secunia.com/advisories/28429
http://secunia.com/advisories/28487
http://secunia.com/advisories/28579
http://secunia.com/advisories/29161
http://secunia.com/advisories/29323
http://secunia.com/advisories/30538
http://secunia.com/advisories/30718
http://sunsolve.sun.com/search/document.do?assetkey=1-26-238493-1
SuSE Security Announcement: SUSE-SR:2008:006 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00004.html
http://www.vupen.com/english/advisories/2008/0193
http://www.vupen.com/english/advisories/2008/0703
http://www.vupen.com/english/advisories/2008/1743/references
XForce ISS Database: freebsd-inetnetwork-bo(39670)
https://exchange.xforce.ibmcloud.com/vulnerabilities/39670
CopyrightCopyright (C) 2015 Greenbone AG

Esta es sólo una de 146377 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.