FreshPorts - VuXML

This page displays vulnerability information about FreeBSD Ports.

The VUXML data was last processed by FreshPorts on 2024-03-29 07:54:42 UTC

List all Vulnerabilities, by package

List all Vulnerabilities, by date

k68

These are the vulnerabilities relating to the commit you have selected:

VuXML IDDescription
57a700f9-12c0-11e2-9f86-001d923933b6dns/bind9* -- crash on deliberately constructed combination of records

ISC reports:

A deliberately constructed combination of records could cause named to hang while populating the additional section of a response.


Discovery 2012-09-26
Entry 2012-10-10
bind99
< 9.9.1.4

bind99-base
< 9.9.1.4

bind98
< 9.8.3.4

bind98-base
< 9.8.3.4

bind97
< 9.7.6.4

bind97-base
< 9.7.6.4

bind96
< 9.6.3.1.ESV.R7.4

bind96-base
< 9.6.3.1.ESV.R7.4

CVE-2012-5166
72f35727-ce83-11e2-be04-005056a37f68dns/bind9* -- A recursive resolver can be crashed by a query for a malformed zone

ISC reports:

A bug has been discovered in the most recent releases of BIND 9 which has the potential for deliberate exploitation as a denial-of-service attack. By sending a recursive resolver a query for a record in a specially malformed zone, an attacker can cause BIND 9 to exit with a fatal "RUNTIME_CHECK" error in resolver.c.


Discovery 2013-06-04
Entry 2013-06-06
Modified 2013-06-07
bind99
gt 9.9.3 lt 9.9.3.1

bind99-base
gt 9.9.3 lt 9.9.3.1

bind98
gt 9.8.5 lt 9.8.5.1

bind98-base
gt 9.8.5 lt 9.8.5.1

bind96
gt 9.6.3.1.ESV.R9 lt 9.6.3.2.ESV.R9

bind96-base
gt 9.6.3.1.ESV.R9 lt 9.6.3.2.ESV.R9

CVE-2013-3919
ab3e98d9-8175-11e4-907d-d050992ecde8bind -- denial of service vulnerability

ISC reports:

We have today posted updated versions of 9.9.6 and 9.10.1 to address a significant security vulnerability in DNS resolution. The flaw was discovered by Florian Maury of ANSSI, and applies to any recursive resolver that does not support a limit on the number of recursions. [CERTFR-2014-AVI-512], [USCERT VU#264212]

A flaw in delegation handling could be exploited to put named into an infinite loop, in which each lookup of a name server triggered additional lookups of more name servers. This has been addressed by placing limits on the number of levels of recursion named will allow (default 7), and on the number of queries that it will send before terminating a recursive query (default 50). The recursion depth limit is configured via the max-recursion-depth option, and the query limit via the max-recursion-queries option. For more information, see the security advisory at https://kb.isc.org/article/AA-01216/. [CVE-2014-8500] [RT #37580]

In addition, we have also corrected a potential security vulnerability in the GeoIP feature in the 9.10.1 release only. For more information on this issue, see the security advisory at https://kb.isc.org/article/AA-01217. [CVE-2014-8680]


Discovery 2014-12-08
Entry 2014-12-11
Modified 2016-08-09
bind99
bind99-base
< 9.9.6

bind98
bind98-base
bind96
bind96-base
gt 0

FreeBSD
ge 9.3 lt 9.3_6

ge 9.2 lt 9.2_16

ge 9.1 lt 9.1_23

ge 8.4 lt 8.4_20

SA-14:29.bind
CVE-2014-8500
CVE-2014-8680
https://www.isc.org/blogs/important-security-advisory-posted/
cb252f01-7c43-11e3-b0a6-005056a37f68bind -- denial of service vulnerability

ISC reports:

Because of a defect in handling queries for NSEC3-signed zones, BIND can crash with an "INSIST" failure in name.c when processing queries possessing certain properties. By exploiting this defect an attacker deliberately constructing a query with the right properties could achieve denial of service against an authoritative nameserver serving NSEC3-signed zones.


Discovery 2014-01-08
Entry 2014-01-13
Modified 2016-08-09
bind99
< 9.9.4.2

bind99-base
< 9.9.4.2

bind98
< 9.8.6.2

bind98-base
< 9.8.6.2

bind96
< 9.6.3.2.ESV.R10.2

bind96-base
< 9.6.3.2.ESV.R10.2

FreeBSD
ge 9.2 lt 9.2_3

ge 9.1 lt 9.1_10

ge 8.4 lt 8.4_7

ge 8.3 lt 8.3_14

CVE-2014-0591
SA-14:04.bind
https://kb.isc.org/article/AA-01078/74/