FreshPorts - VuXML

This page displays vulnerability information about FreeBSD Ports.

The VUXML data was last processed by FreshPorts on 2024-04-24 21:00:48 UTC

List all Vulnerabilities, by package

List all Vulnerabilities, by date

k68

These are the vulnerabilities relating to the commit you have selected:

VuXML IDDescription
2c5e7e23-5248-11e5-9ad8-14dae9d210b8bind -- denial of service vulnerability

ISC reports:

An incorrect boundary check in openpgpkey_61.c can cause named to terminate due to a REQUIRE assertion failure. This defect can be deliberately exploited by an attacker who can provide a maliciously constructed response in answer to a query.


Discovery 2015-08-19
Entry 2015-09-03
bind99
ge 9.9.7 lt 9.9.7P3

bind910
< 9.10.2P4

bind910-base
bind99-base
gt 0

https://www.isc.org/blogs/cve-2015-5986-an-incorrect-boundary-check-can-trigger-a-require-assertion-failure-in-openpgpkey_61-c/
CVE-2015-5986
58033a95-bba8-11e4-88ae-d050992ecde8bind -- denial of service vulnerability

ISC reports:

When configured to perform DNSSEC validation, named can crash when encountering a rare set of conditions in the managed trust anchors.


Discovery 2015-02-18
Entry 2015-02-23
Modified 2016-08-09
bind910
bind910-base
< 9.10.1P2

bind99
bind99-base
< 9.9.6P2

FreeBSD
ge 9.3 lt 9.3_10

ge 8.4 lt 8.4_24

SA-15:05.bind
CVE-2015-1349
https://kb.isc.org/article/AA-01235
731cdeaa-3564-11e5-9970-14dae9d210b8bind -- denial of service vulnerability

ISC reports:

An error in the handling of TKEY queries can be exploited by an attacker for use as a denial-of-service vector, as a constructed packet can use the defect to trigger a REQUIRE assertion failure, causing BIND to exit.


Discovery 2015-07-21
Entry 2015-07-28
Modified 2016-08-09
bind910
< 9.10.2P3

bind99
< 9.9.7P2

bind910-base
bind99-base
gt 0

FreeBSD
ge 9.3 lt 9.3_21

ge 8.4 lt 8.4_35

SA-15:17.bind
CVE-2015-5477
https://kb.isc.org/article/AA-01272/
c93533a3-24f1-11e5-8b74-3c970e169bc2bind -- denial of service vulnerability

ISC reports:

A very uncommon combination of zone data has been found that triggers a bug in BIND, with the result that named will exit with a "REQUIRE" failure in name.c when validating the data returned in answer to a recursive query.

A recursive resolver that is performing DNSSEC validation can be deliberately terminated by any attacker who can cause a query to be performed against a maliciously constructed zone. This will result in a denial of service to clients who rely on that resolver.


Discovery 2015-07-07
Entry 2015-07-07
Modified 2016-08-09
bind910
< 9.10.2P2

bind99
< 9.9.7P1

bind910-base
bind99-base
gt 0

FreeBSD
ge 9.3 lt 9.3_19

ge 8.4 lt 8.4_33

SA-15:11.bind
CVE-2015-4620
https://kb.isc.org/article/AA-01267/
eaf3b255-5245-11e5-9ad8-14dae9d210b8bind -- denial of service vulnerability

ISC reports:

Parsing a malformed DNSSEC key can cause a validating resolver to exit due to a failed assertion in buffer.c. It is possible for a remote attacker to deliberately trigger this condition, for example by using a query which requires a response from a zone containing a deliberately malformed key.


Discovery 2015-08-19
Entry 2015-09-03
Modified 2016-08-09
bind99
< 9.9.7P3

bind910
ge 9.10.2 lt 9.10.2P4

bind910-base
bind99-base
gt 0

FreeBSD
ge 9.3 lt 9.3_25

https://www.isc.org/blogs/cve-2015-5722-parsing-malformed-keys-may-cause-bind-to-exit-due-to-a-failed-assertion-in-buffer-c/
CVE-2015-5722
SA-15:23.bind