サクサク読めて、アプリ限定の機能も多数!
トップへ戻る
衆議院選挙2026
kb.isc.org
CVE-2015-8704: Specific APL data could trigger an INSIST in apl_42.c CVE: CVE-2015-8704 Document version: 2.0 Posting date: 19 January 2016 Program impacted: BIND Versions affected: 9.3.0->9.8.8, 9.9.0->9.9.8-P2, 9.9.3-S1->9.9.8-S3, 9.10.0->9.10.3-P2 Severity: High Exploitable: Remotely Description: A buffer size check used to guard against overflow could cause named to exit with an INSIST failure
CVE-2015-8000: Responses with a malformed class attribute can trigger an assertion failure in db.c Prev Next CVE: CVE-2015-8000 Document version: 2.0 Posting date: 15 December 2015 Program impacted: BIND 9 Versions affected: 9.0.x -> 9.9.8, 9.10.0 -> 9.10.3 Severity: Critical Exploitable: Remotely Description: An error in the parsing of incoming responses allows some records with an incorrect clas
CVE-2015-5986: An incorrect boundary check can trigger a REQUIRE assertion failure in openpgpkey_61.c Prev Next CVE: CVE-2015-5986 Document version: 2.0 Posting date: 02 September 2015 Program impacted: BIND 9 Versions affected: 9.9.7 -> 9.9.7-P2, 9.10.2 -> 9.10.2-P3. Severity: Critical Exploitable: Remotely Description: An incorrect boundary check in openpgpkey_61.c can cause named to terminate d
An error in the handling of TKEY queries can be exploited by an attacker for use as a denial-of-service vector, as a constructed packet can use the defect to trigger a REQUIRE assertion failure, causing BIND to exit.
Prev Next 特別に細工されたクエリによってBINDネームサーバがクラッシュ(異常終了)する CVE: CVE-2013-4854 文書バージョン: 2.0 公開日付: 2013年7月26日 影響を受けるプログラム: BIND 影響を受けるバージョン: オープンソース版: 9.7.0から9.7.7, 9.8.0から9.8.5-P1, 9.9.0から9.9.3-P1, 9.8.6b1 および 9.9.4b1。サブスクリプション版: 9.9.3-S1 および 9.9.4-S1b1。 深刻度: 重大(Critical) 攻撃方法: 遠隔から可能 詳細: 不正なRDATAを含む、特別に細工されたクエリによって、namedを表明違反(assertion failure)にて終了させることが可能です。この表明違反は、この不正なクエリを拒絶する処理の途中で発生します。 BIND 9.6-ESVは本
CVE-2013-4854: A specially crafted query can cause BIND to terminate abnormally Prev Next A specially crafted query sent to a BIND nameserver can cause it to crash (terminate abnormally). CVE: CVE-2013-4854 Document version: 2.0 Posting date: 26 July 2013 Program impacted: BIND Versions affected: Open source: 9.7.0->9.7.7, 9.8.0->9.8.5-P1, 9.9.0->9.9.3-P1, 9.8.6b1 and 9.9.4b1; Subscription: 9.9.3-
CVE-2013-3919: A recursive resolver can be crashed by a query for a malformed zone Prev Next A defect exists which allows an attacker to crash a BIND 9 recursive resolver with a RUNTIME_CHECK error in resolver.c CVE: CVE-2013-3919 Document version: 1.1 Posting date: 04 Jun 2013 Program impacted: BIND 9 Versions affected: BIND 9.6-ESV-R9, 9.8.5, and 9.9.3 are affected. Versions 9.6.0 through 9.6-ES
Prev Next BIND 9の深刻な欠陥により、攻撃者が、named、およびlibdnsをリンクする他のプラグラムのメモリを過大に消費させることが可能となります。 CVE: CVE-2013-2266 文書バージョン: 2.0 公開日付: 2013年3月26日 影響を受けるプログラム: BIND 影響を受けるバージョン: BIND 9.7.x, 9.8.0 から 9.8.5b1, 9.9.0 から 9.9.3b1(いずれも"Unix"版のみ。Windows版は影響を受けない。9.7.0より前のバージョン(9.6-ESVを含む)も影響を受けない。BIND 10も影響を受けない) 深刻度: 重大(Critical) 攻撃方法: 遠隔から可能 詳細: Unix系のオペレーティングシステムでコンパイルされたBIND 9.7, 9.8, および9.9で利用されているライブラリの欠陥により、攻撃者
Comprehensive documentation to help you make the most of ISC's open source software.
CVE-2012-4244: A specially crafted Resource Record could cause named to terminate Prev Next A nameserver can be caused to exit with a REQUIRE exception if it can be induced to load a specially crafted resource record. CVE: CVE-2012-4244 Document version: 2.0 Posting date: 12 September 2012 Program impacted: BIND Versions affected: 9.0.x -> 9.6.x, 9.4-ESV->9.4-ESV-R5-P1, 9.6-ESV->9.6-ESV-R7-P2, 9.7
CVE-2012-1033: Ghost Domain Names: Revoked Yet Still Resolvable Prev Next After completing our analysis of the DNS exploit reported by Professor Haixin Duan of Tsinghua University, ISC has determined that the behavior he describes, while verifiable, is due to design issues in the DNS protocol. No immediate steps are planned to address the issue. Further information concerning the implications of t
CVE-2011-4313: BIND 9 Resolver crashes after logging an error in query.c Prev Next Organizations across the Internet reported crashes interrupting service on BIND 9 nameservers performing recursive queries. Affected servers crashed after logging an error in query.c with the following message: "INSIST(! dns_rdataset_isassociated(sigrdataset))" Multiple versions were reported being affected, includi
Prev Next The BIND 9 Software Vulnerability Matrix (previously know as the "BIND 9 Security Vulnerability Matrix") is a tool to help DNS operators understand the current security risk for a given version of BIND. It has two parts: The first part is a table listing all of the vulnerabilities covered by this page. The first column is a reference number for use in the tables in the second part. The s
このページを最初にブックマークしてみませんか?
『ISC Knowledgebase』の新着エントリーを見る
j次のブックマーク
k前のブックマーク
lあとで読む
eコメント一覧を開く
oページを開く