bind received updates to fix bugs and security issues.
On openSUSE 12.2, bind was updated to 9.9.2-P1. On openSUSE 12.1, bind was updated to 9.8.4-P1.
Main security fix: CVE-2012-5688: Prevents named from aborting with a require assertion failure on servers with DNS64 enabled. These crashes might occur as a result of specific queries that are received. (Note that this fix is a subset of a series of updates that will be included in full in BIND 9.8.5 and 9.9.3 as change #3388, RT #30996).
[CVE-2012-5688] [RT #30792]
{"id": "OPENSUSE-2012-853.NASL", "vendorId": null, "type": "nessus", "bulletinFamily": "scanner", "title": "openSUSE Security Update : bind (openSUSE-SU-2012:1649-1)", "description": "bind received updates to fix bugs and security issues.\n\nOn openSUSE 12.2, bind was updated to 9.9.2-P1. On openSUSE 12.1, bind was updated to 9.8.4-P1.\n\nMain security fix: CVE-2012-5688: Prevents named from aborting with a require assertion failure on servers with DNS64 enabled. These crashes might occur as a result of specific queries that are received. (Note that this fix is a subset of a series of updates that will be included in full in BIND 9.8.5 and 9.9.3 as change #3388, RT #30996).\n[CVE-2012-5688] [RT #30792]", "published": "2014-06-13T00:00:00", "modified": "2021-01-19T00:00:00", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}, "cvss2": {}, "cvss3": {"score": null, "vector": null}, "href": "https://www.tenable.com/plugins/nessus/74845", "reporter": "This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.", "references": ["https://lists.opensuse.org/opensuse-updates/2012-12/msg00030.html", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5688", "https://bugzilla.novell.com/show_bug.cgi?id=792926"], "cvelist": ["CVE-2012-5688"], "immutableFields": [], "lastseen": "2022-04-16T14:06:37", "viewCount": 3, "enchantments": {"dependencies": {"references": [{"type": "amazon", "idList": ["ALAS-2012-146"]}, {"type": "centos", "idList": ["CESA-2012:1549"]}, {"type": "cve", "idList": ["CVE-2012-5688"]}, {"type": "debiancve", "idList": ["DEBIANCVE:CVE-2012-5688"]}, {"type": "fedora", "idList": ["FEDORA:1EF0120940", "FEDORA:7144920A56", "FEDORA:853AA20DE7"]}, {"type": "freebsd", "idList": ["2892A8E2-3D68-11E2-8E01-0800273FE665", "4671CDC9-7C6D-11E2-809B-6C626D99876C"]}, {"type": "gentoo", "idList": ["GLSA-201401-34"]}, {"type": "nessus", "idList": ["6810.PRM", "8008.PRM", "ALA_ALAS-2012-146.NASL", "BIND9_992_P1.NASL", "CENTOS_RHSA-2012-1549.NASL", "FEDORA_2012-19777.NASL", "FEDORA_2012-19822.NASL", "FEDORA_2012-19830.NASL", "FREEBSD_PKG_2892A8E23D6811E28E010800273FE665.NASL", "FREEBSD_PKG_4671CDC97C6D11E2809B6C626D99876C.NASL", "GENTOO_GLSA-201401-34.NASL", "MACOSX_10_8_5.NASL", "MACOSX_SECUPD2013-004.NASL", "MANDRIVA_MDVSA-2012-177.NASL", "OPENSUSE-2013-296.NASL", "ORACLELINUX_ELSA-2012-1549.NASL", "ORACLEVM_OVMSA-2017-0066.NASL", "ORACLEVM_OVMSA-2020-0021.NASL", "REDHAT-RHSA-2012-1549.NASL", "SLACKWARE_SSA_2012-341-01.NASL", "SL_20121206_BIND_ON_SL6_X.NASL", "UBUNTU_USN-1657-1.NASL"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310120175", "OPENVAS:1361412562310121131", "OPENVAS:1361412562310123772", "OPENVAS:1361412562310807204", "OPENVAS:1361412562310831754", "OPENVAS:1361412562310841245", "OPENVAS:1361412562310864931", "OPENVAS:1361412562310864963", "OPENVAS:1361412562310870869", "OPENVAS:1361412562310881548", "OPENVAS:831754", "OPENVAS:841245", "OPENVAS:864931", "OPENVAS:864963", "OPENVAS:870869", "OPENVAS:881548"]}, {"type": "oraclelinux", "idList": ["ELSA-2012-1549", "ELSA-2013-0550", "ELSA-2022-9117"]}, {"type": "redhat", "idList": ["RHSA-2012:1549"]}, {"type": "securityvulns", "idList": ["SECURITYVULNS:DOC:29893", "SECURITYVULNS:VULN:12742"]}, {"type": "seebug", "idList": ["SSV:60500"]}, {"type": "slackware", "idList": ["SSA-2012-341-01"]}, {"type": "threatpost", "idList": ["THREATPOST:4550F15F5FA9CB180F8CFF266DA58A03"]}, {"type": "ubuntu", "idList": ["USN-1657-1"]}, {"type": "ubuntucve", "idList": ["UB:CVE-2012-5688"]}]}, "score": {"value": 5.1, "vector": "NONE"}, "backreferences": {"references": [{"type": "amazon", "idList": ["ALAS-2012-146"]}, {"type": "centos", "idList": ["CESA-2012:1549"]}, {"type": "cve", "idList": ["CVE-2012-5688"]}, {"type": "debiancve", "idList": ["DEBIANCVE:CVE-2012-5688"]}, {"type": "fedora", "idList": ["FEDORA:7144920A56"]}, {"type": "freebsd", "idList": ["2892A8E2-3D68-11E2-8E01-0800273FE665", "4671CDC9-7C6D-11E2-809B-6C626D99876C"]}, {"type": "nessus", "idList": ["GENTOO_GLSA-201401-34.NASL", "ORACLEVM_OVMSA-2020-0021.NASL", "UBUNTU_USN-1657-1.NASL"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310881548"]}, {"type": "redhat", "idList": ["RHSA-2012:1549"]}, {"type": "securityvulns", "idList": ["SECURITYVULNS:DOC:29893"]}, {"type": "seebug", "idList": ["SSV:60500"]}, {"type": "slackware", "idList": ["SSA-2012-341-01"]}, {"type": "threatpost", "idList": ["THREATPOST:4550F15F5FA9CB180F8CFF266DA58A03"]}, {"type": "ubuntu", "idList": ["USN-1657-1"]}]}, "exploitation": null, "vulnersScore": 5.1}, "_state": {"dependencies": 0, "score": 0}, "_internal": {}, "pluginID": "74845", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update openSUSE-2012-853.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(74845);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2012-5688\");\n\n script_name(english:\"openSUSE Security Update : bind (openSUSE-SU-2012:1649-1)\");\n script_summary(english:\"Check for the openSUSE-2012-853 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"bind received updates to fix bugs and security issues.\n\nOn openSUSE 12.2, bind was updated to 9.9.2-P1. On openSUSE 12.1, bind\nwas updated to 9.8.4-P1.\n\nMain security fix: CVE-2012-5688: Prevents named from aborting with a\nrequire assertion failure on servers with DNS64 enabled. These crashes\nmight occur as a result of specific queries that are received. (Note\nthat this fix is a subset of a series of updates that will be included\nin full in BIND 9.8.5 and 9.9.3 as change #3388, RT #30996).\n[CVE-2012-5688] [RT #30792]\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=792926\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://lists.opensuse.org/opensuse-updates/2012-12/msg00030.html\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected bind packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:bind\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:bind-chrootenv\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:bind-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:bind-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:bind-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:bind-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:bind-libs-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:bind-libs-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:bind-libs-debuginfo-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:bind-lwresd\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:bind-lwresd-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:bind-utils\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:bind-utils-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:12.1\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:12.2\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2012/12/07\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/06/13\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE12\\.1|SUSE12\\.2)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"12.1 / 12.2\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686|x86_64)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686 / x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE12.1\", reference:\"bind-9.8.4P1-4.28.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.1\", reference:\"bind-chrootenv-9.8.4P1-4.28.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.1\", reference:\"bind-debuginfo-9.8.4P1-4.28.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.1\", reference:\"bind-debugsource-9.8.4P1-4.28.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.1\", reference:\"bind-devel-9.8.4P1-4.28.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.1\", reference:\"bind-libs-9.8.4P1-4.28.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.1\", reference:\"bind-libs-debuginfo-9.8.4P1-4.28.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.1\", reference:\"bind-lwresd-9.8.4P1-4.28.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.1\", reference:\"bind-lwresd-debuginfo-9.8.4P1-4.28.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.1\", reference:\"bind-utils-9.8.4P1-4.28.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.1\", reference:\"bind-utils-debuginfo-9.8.4P1-4.28.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.1\", cpu:\"x86_64\", reference:\"bind-libs-32bit-9.8.4P1-4.28.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.1\", cpu:\"x86_64\", reference:\"bind-libs-debuginfo-32bit-9.8.4P1-4.28.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", reference:\"bind-9.9.2P1-1.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", reference:\"bind-chrootenv-9.9.2P1-1.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", reference:\"bind-debuginfo-9.9.2P1-1.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", reference:\"bind-debugsource-9.9.2P1-1.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", reference:\"bind-devel-9.9.2P1-1.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", reference:\"bind-libs-9.9.2P1-1.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", reference:\"bind-libs-debuginfo-9.9.2P1-1.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", reference:\"bind-lwresd-9.9.2P1-1.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", reference:\"bind-lwresd-debuginfo-9.9.2P1-1.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", reference:\"bind-utils-9.9.2P1-1.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", reference:\"bind-utils-debuginfo-9.9.2P1-1.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", cpu:\"x86_64\", reference:\"bind-libs-32bit-9.9.2P1-1.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.2\", cpu:\"x86_64\", reference:\"bind-libs-debuginfo-32bit-9.9.2P1-1.12.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"bind\");\n}\n", "naslFamily": "SuSE Local Security Checks", "cpe": ["p-cpe:/a:novell:opensuse:bind", "p-cpe:/a:novell:opensuse:bind-chrootenv", "p-cpe:/a:novell:opensuse:bind-debuginfo", "p-cpe:/a:novell:opensuse:bind-debugsource", "p-cpe:/a:novell:opensuse:bind-devel", "p-cpe:/a:novell:opensuse:bind-libs", "p-cpe:/a:novell:opensuse:bind-libs-32bit", "p-cpe:/a:novell:opensuse:bind-libs-debuginfo", "p-cpe:/a:novell:opensuse:bind-libs-debuginfo-32bit", "p-cpe:/a:novell:opensuse:bind-lwresd", "p-cpe:/a:novell:opensuse:bind-lwresd-debuginfo", "p-cpe:/a:novell:opensuse:bind-utils", "p-cpe:/a:novell:opensuse:bind-utils-debuginfo", "cpe:/o:novell:opensuse:12.1", "cpe:/o:novell:opensuse:12.2"], "solution": "Update the affected bind packages.", "nessusSeverity": "High", "cvssScoreSource": "", "vpr": {"risk factor": "Low", "score": "3.6"}, "exploitAvailable": false, "exploitEase": "", "patchPublicationDate": "2012-12-07T00:00:00", "vulnerabilityPublicationDate": null, "exploitableWith": []}
{"nessus": [{"lastseen": "2022-03-27T18:36:41", "description": "A flaw was found in the DNS64 implementation in BIND. If a remote attacker sent a specially crafted query to a named server, named could exit unexpectedly with an assertion failure. Note that DNS64 support is not enabled by default. (CVE-2012-5688)", "cvss3": {"score": null, "vector": null}, "published": "2013-09-04T00:00:00", "type": "nessus", "title": "Amazon Linux AMI : bind (ALAS-2012-146)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-5688"], "modified": "2018-04-18T00:00:00", "cpe": ["p-cpe:/a:amazon:linux:bind", "p-cpe:/a:amazon:linux:bind-chroot", "p-cpe:/a:amazon:linux:bind-debuginfo", "p-cpe:/a:amazon:linux:bind-devel", "p-cpe:/a:amazon:linux:bind-libs", "p-cpe:/a:amazon:linux:bind-sdb", "p-cpe:/a:amazon:linux:bind-utils", "cpe:/o:amazon:linux"], "id": "ALA_ALAS-2012-146.NASL", "href": "https://www.tenable.com/plugins/nessus/69636", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Amazon Linux AMI Security Advisory ALAS-2012-146.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(69636);\n script_version(\"1.6\");\n script_cvs_date(\"Date: 2018/04/18 15:09:34\");\n\n script_cve_id(\"CVE-2012-5688\");\n script_xref(name:\"ALAS\", value:\"2012-146\");\n script_xref(name:\"RHSA\", value:\"2012:1549\");\n\n script_name(english:\"Amazon Linux AMI : bind (ALAS-2012-146)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Amazon Linux AMI host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"A flaw was found in the DNS64 implementation in BIND. If a remote\nattacker sent a specially crafted query to a named server, named could\nexit unexpectedly with an assertion failure. Note that DNS64 support\nis not enabled by default. (CVE-2012-5688)\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://alas.aws.amazon.com/ALAS-2012-146.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Run 'yum update bind' to update your system.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:bind\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:bind-chroot\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:bind-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:bind-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:bind-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:bind-sdb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:bind-utils\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:amazon:linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2012/12/07\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/09/04\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2013-2018 Tenable Network Security, Inc.\");\n script_family(english:\"Amazon Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/AmazonLinux/release\", \"Host/AmazonLinux/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nrelease = get_kb_item(\"Host/AmazonLinux/release\");\nif (isnull(release) || !strlen(release)) audit(AUDIT_OS_NOT, \"Amazon Linux\");\nos_ver = pregmatch(pattern: \"^AL(A|\\d)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Amazon Linux\");\nos_ver = os_ver[1];\nif (os_ver != \"A\")\n{\n if (os_ver == 'A') os_ver = 'AMI';\n audit(AUDIT_OS_NOT, \"Amazon Linux AMI\", \"Amazon Linux \" + os_ver);\n}\n\nif (!get_kb_item(\"Host/AmazonLinux/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (rpm_check(release:\"ALA\", reference:\"bind-9.8.2-0.10.rc1.26.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"bind-chroot-9.8.2-0.10.rc1.26.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"bind-debuginfo-9.8.2-0.10.rc1.26.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"bind-devel-9.8.2-0.10.rc1.26.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"bind-libs-9.8.2-0.10.rc1.26.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"bind-sdb-9.8.2-0.10.rc1.26.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"bind-utils-9.8.2-0.10.rc1.26.amzn1\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"bind / bind-chroot / bind-debuginfo / bind-devel / bind-libs / etc\");\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2022-03-27T14:57:58", "description": "Updated bind packages that fix one security issue are now available for Red Hat Enterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section.\n\nThe Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. DNS64 is used to automatically generate DNS records so IPv6 based clients can access IPv4 systems through a NAT64 server.\n\nA flaw was found in the DNS64 implementation in BIND. If a remote attacker sent a specially crafted query to a named server, named could exit unexpectedly with an assertion failure. Note that DNS64 support is not enabled by default. (CVE-2012-5688)\n\nUsers of bind are advised to upgrade to these updated packages, which correct this issue. After installing the update, the BIND daemon (named) will be restarted automatically.", "cvss3": {"score": null, "vector": null}, "published": "2012-12-09T00:00:00", "type": "nessus", "title": "CentOS 6 : bind (CESA-2012:1549)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-5688"], "modified": "2021-01-04T00:00:00", "cpe": ["p-cpe:/a:centos:centos:bind", "p-cpe:/a:centos:centos:bind-chroot", "p-cpe:/a:centos:centos:bind-devel", "p-cpe:/a:centos:centos:bind-libs", "p-cpe:/a:centos:centos:bind-sdb", "p-cpe:/a:centos:centos:bind-utils", "cpe:/o:centos:centos:6"], "id": "CENTOS_RHSA-2012-1549.NASL", "href": "https://www.tenable.com/plugins/nessus/63187", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2012:1549 and \n# CentOS Errata and Security Advisory 2012:1549 respectively.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(63187);\n script_version(\"1.14\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2012-5688\");\n script_bugtraq_id(56817);\n script_xref(name:\"RHSA\", value:\"2012:1549\");\n\n script_name(english:\"CentOS 6 : bind (CESA-2012:1549)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote CentOS host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated bind packages that fix one security issue are now available\nfor Red Hat Enterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. A Common Vulnerability Scoring System\n(CVSS) base score, which gives a detailed severity rating, is\navailable from the CVE link in the References section.\n\nThe Berkeley Internet Name Domain (BIND) is an implementation of the\nDomain Name System (DNS) protocols. BIND includes a DNS server\n(named); a resolver library (routines for applications to use when\ninterfacing with DNS); and tools for verifying that the DNS server is\noperating correctly. DNS64 is used to automatically generate DNS\nrecords so IPv6 based clients can access IPv4 systems through a NAT64\nserver.\n\nA flaw was found in the DNS64 implementation in BIND. If a remote\nattacker sent a specially crafted query to a named server, named could\nexit unexpectedly with an assertion failure. Note that DNS64 support\nis not enabled by default. (CVE-2012-5688)\n\nUsers of bind are advised to upgrade to these updated packages, which\ncorrect this issue. After installing the update, the BIND daemon\n(named) will be restarted automatically.\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2012-December/019025.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?23a5efdf\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected bind packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2012-5688\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:bind\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:bind-chroot\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:bind-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:bind-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:bind-sdb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:bind-utils\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:centos:centos:6\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2012/12/06\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2012/12/06\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2012/12/09\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2012-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"CentOS Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/CentOS/release\", \"Host/CentOS/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/CentOS/release\");\nif (isnull(release) || \"CentOS\" >!< release) audit(AUDIT_OS_NOT, \"CentOS\");\nos_ver = pregmatch(pattern: \"CentOS(?: Linux)? release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"CentOS\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^6([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"CentOS 6.x\", \"CentOS \" + os_ver);\n\nif (!get_kb_item(\"Host/CentOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"CentOS\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"CentOS-6\", reference:\"bind-9.8.2-0.10.rc1.el6_3.6\")) flag++;\nif (rpm_check(release:\"CentOS-6\", reference:\"bind-chroot-9.8.2-0.10.rc1.el6_3.6\")) flag++;\nif (rpm_check(release:\"CentOS-6\", reference:\"bind-devel-9.8.2-0.10.rc1.el6_3.6\")) flag++;\nif (rpm_check(release:\"CentOS-6\", reference:\"bind-libs-9.8.2-0.10.rc1.el6_3.6\")) flag++;\nif (rpm_check(release:\"CentOS-6\", reference:\"bind-sdb-9.8.2-0.10.rc1.el6_3.6\")) flag++;\nif (rpm_check(release:\"CentOS-6\", reference:\"bind-utils-9.8.2-0.10.rc1.el6_3.6\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"bind / bind-chroot / bind-devel / bind-libs / bind-sdb / bind-utils\");\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2022-03-27T14:57:59", "description": "A vulnerability was discovered and corrected in bind :\n\nBIND 9 nameservers using the DNS64 IPv6 transition mechanism are vulnerable to a software defect that allows a crafted query to crash the server with a REQUIRE assertion failure. Remote exploitation of this defect can be achieved without extensive effort, resulting in a denial-of-service (DoS) vector against affected servers (CVE-2012-5688).\n\nThe updated packages have been upgraded to bind 9.8.4-P1 which is not vulnerable to this issue.", "cvss3": {"score": null, "vector": null}, "published": "2012-12-06T00:00:00", "type": "nessus", "title": "Mandriva Linux Security Advisory : bind (MDVSA-2012:177)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-5688"], "modified": "2021-01-06T00:00:00", "cpe": ["p-cpe:/a:mandriva:linux:bind", "p-cpe:/a:mandriva:linux:bind-devel", "p-cpe:/a:mandriva:linux:bind-doc", "p-cpe:/a:mandriva:linux:bind-utils", "cpe:/o:mandriva:linux:2011"], "id": "MANDRIVA_MDVSA-2012-177.NASL", "href": "https://www.tenable.com/plugins/nessus/63161", "sourceData": "#%NASL_MIN_LEVEL 70300\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Mandriva Linux Security Advisory MDVSA-2012:177. \n# The text itself is copyright (C) Mandriva S.A.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(63161);\n script_version(\"1.15\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2012-5688\");\n script_bugtraq_id(56817);\n script_xref(name:\"MDVSA\", value:\"2012:177\");\n\n script_name(english:\"Mandriva Linux Security Advisory : bind (MDVSA-2012:177)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Mandriva Linux host is missing one or more security\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"A vulnerability was discovered and corrected in bind :\n\nBIND 9 nameservers using the DNS64 IPv6 transition mechanism are\nvulnerable to a software defect that allows a crafted query to crash\nthe server with a REQUIRE assertion failure. Remote exploitation of\nthis defect can be achieved without extensive effort, resulting in a\ndenial-of-service (DoS) vector against affected servers\n(CVE-2012-5688).\n\nThe updated packages have been upgraded to bind 9.8.4-P1 which is not\nvulnerable to this issue.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"ftp://ftp.isc.org/isc/bind9/9.8.4-P1/CHANGES\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://kb.isc.org/docs/aa-00828\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:bind\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:bind-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:bind-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:bind-utils\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:mandriva:linux:2011\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2012/12/05\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2012/12/06\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2012-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Mandriva Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/Mandrake/release\", \"Host/Mandrake/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Mandrake/release\")) audit(AUDIT_OS_NOT, \"Mandriva / Mandake Linux\");\nif (!get_kb_item(\"Host/Mandrake/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^(amd64|i[3-6]86|x86_64)$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Mandriva / Mandrake Linux\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"MDK2011\", reference:\"bind-9.8.4-0.0.P1.0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"bind-devel-9.8.4-0.0.P1.0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"bind-doc-9.8.4-0.0.P1.0.1-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"bind-utils-9.8.4-0.0.P1.0.1-mdv2011.0\", yank:\"mdv\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2022-03-27T14:58:08", "description": "This update fixes CVE-2012-5688.\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"score": null, "vector": null}, "published": "2012-12-31T00:00:00", "type": "nessus", "title": "Fedora 16 : bind-9.8.4-3.P1.fc16 (2012-19822)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-5688"], "modified": "2021-01-11T00:00:00", "cpe": ["p-cpe:/a:fedoraproject:fedora:bind", "cpe:/o:fedoraproject:fedora:16"], "id": "FEDORA_2012-19822.NASL", "href": "https://www.tenable.com/plugins/nessus/63360", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2012-19822.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(63360);\n script_version(\"1.13\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2012-5688\");\n script_bugtraq_id(56817);\n script_xref(name:\"FEDORA\", value:\"2012-19822\");\n\n script_name(english:\"Fedora 16 : bind-9.8.4-3.P1.fc16 (2012-19822)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update fixes CVE-2012-5688.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=883533\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2012-December/095174.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?f7ac8de7\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected bind package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:bind\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:16\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2012/12/06\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2012/12/31\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2012-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^16([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 16.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC16\", reference:\"bind-9.8.4-3.P1.fc16\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"bind\");\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2022-03-27T14:58:00", "description": "This update fixes CVE-2012-5688.\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"score": null, "vector": null}, "published": "2012-12-13T00:00:00", "type": "nessus", "title": "Fedora 17 : bind-9.9.2-3.P1.fc17 (2012-19830)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-5688"], "modified": "2021-01-11T00:00:00", "cpe": ["p-cpe:/a:fedoraproject:fedora:bind", "cpe:/o:fedoraproject:fedora:17"], "id": "FEDORA_2012-19830.NASL", "href": "https://www.tenable.com/plugins/nessus/63255", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2012-19830.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(63255);\n script_version(\"1.13\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2012-5688\");\n script_bugtraq_id(56817);\n script_xref(name:\"FEDORA\", value:\"2012-19830\");\n\n script_name(english:\"Fedora 17 : bind-9.9.2-3.P1.fc17 (2012-19830)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update fixes CVE-2012-5688.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=883533\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2012-December/094591.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?2810116d\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected bind package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:bind\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:17\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2012/12/06\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2012/12/13\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2012-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^17([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 17.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC17\", reference:\"bind-9.9.2-3.P1.fc17\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"bind\");\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2021-08-19T12:54:57", "description": "The remote host is running Bind, a popular name server. \n\nVersions of BIND earlier than 9.8.4-P1 / 9.9.2-P1 are potentially affected by a denial of service vulnerability. Affected versions of BIND can be forced to crash via malicously crafted DNS request.\n\nNote that this vulnerability only affects installs using the 'dns64' configuration option", "cvss3": {"score": 5.3, "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}, "published": "2013-05-13T00:00:00", "type": "nessus", "title": "ISC BIND 9 DNS64 Handling DoS", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-5688"], "modified": "2019-03-06T00:00:00", "cpe": ["cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*"], "id": "6810.PRM", "href": "https://www.tenable.com/plugins/nnm/6810", "sourceData": "Binary data 6810.prm", "cvss": {"score": 5, "vector": "CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2022-03-27T14:57:49", "description": "According to its self-reported version number, the remote installation of BIND can be forced to crash via maliciously crafted DNS requests. \n\nNote that this vulnerability only affects installs using the 'dns64' configuration option. Further note that Nessus has only relied on the version itself and has not attempted to determine whether or not the install is actually affected.", "cvss3": {"score": null, "vector": null}, "published": "2012-12-06T00:00:00", "type": "nessus", "title": "ISC BIND 9 DNS64 Handling DoS", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-5688"], "modified": "2019-12-04T00:00:00", "cpe": ["cpe:/a:isc:bind"], "id": "BIND9_992_P1.NASL", "href": "https://www.tenable.com/plugins/nessus/63166", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(63166);\n script_version(\"1.10\");\n script_cvs_date(\"Date: 2019/12/04\");\n\n script_cve_id(\"CVE-2012-5688\");\n script_bugtraq_id(56817);\n\n script_name(english:\"ISC BIND 9 DNS64 Handling DoS\");\n script_summary(english:\"Checks version of BIND\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote name server is prone to a denial of service attack.\");\n script_set_attribute(attribute:\"description\", value:\n\"According to its self-reported version number, the remote installation\nof BIND can be forced to crash via maliciously crafted DNS requests. \n\nNote that this vulnerability only affects installs using the 'dns64'\nconfiguration option. \n \nFurther note that Nessus has only relied on the version itself and has\nnot attempted to determine whether or not the install is actually\naffected.\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www.isc.org/software/bind/advisories/cve-2012-5688\");\n script_set_attribute(attribute:\"see_also\", value:\"https://kb.isc.org/docs/aa-00828\");\n script_set_attribute(attribute:\"see_also\", value:\"http://ftp.isc.org/isc/bind9/9.8.4-P1/CHANGES\");\n script_set_attribute(attribute:\"see_also\", value:\"http://ftp.isc.org/isc/bind9/9.9.2-P1/CHANGES\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to BIND 9.8.4-P1 / 9.9.2-P1 or later. Alternatively, disable\nDNS64 functionality via configuration options.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2012-5688\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2012/12/04\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2012/12/04\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2012/12/06\");\n\n script_set_attribute(attribute:\"potential_vulnerability\", value:\"true\");\n script_set_attribute(attribute:\"plugin_type\", value:\"remote\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:isc:bind\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"DNS\");\n\n script_copyright(english:\"This script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"bind_version.nasl\");\n script_require_keys(\"bind/version\", \"Settings/ParanoidReport\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\n\nif (report_paranoia < 2) audit(AUDIT_PARANOID);\n\nver = get_kb_item_or_exit(\"bind/version\");\n\n# Check whether BIND is vulnerable, and recommend an upgrade.\n# Vuln 9.8.0 < 9.8.4-P1 and 9.9.0 < 9.9.2-P1\nfix = NULL;\n\n# Vuln 9.8.0 < 9.8.4-P1\nif (ver =~ \"^9\\.8\\.([0-3]($|[^0-9])|4($|\\.|a[1-9]|b[1-9]|rc[1-9]))\")\n fix = '9.8.4-P1';\n# Vuln 9.9.0 < 9.9.2-P1\nelse if (ver =~ \"^9\\.9\\.([0-1]($|[^0-9])|2($|\\.|a[1-9]|b[1-9]|rc[1-9]))\")\n fix = '9.9.2-P1';\nelse\n audit(AUDIT_LISTEN_NOT_VULN, \"BIND\", 53, ver, \"UDP\");\n\nif (report_verbosity > 0)\n{\n report =\n '\\n Installed version : ' + ver +\n '\\n Fixed version : ' + fix +\n '\\n';\n security_hole(port:53, proto:\"udp\", extra:report);\n}\nelse security_hole(port:53, proto:\"udp\");\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2022-03-27T14:57:49", "description": "ISC reports :\n\nBIND 9 nameservers using the DNS64 IPv6 transition mechanism are vulnerable to a software defect that allows a crafted query to crash the server with a REQUIRE assertion failure. Remote exploitation of this defect can be achieved without extensive effort, resulting in a denial-of-service (DoS) vector against affected servers.", "cvss3": {"score": null, "vector": null}, "published": "2012-12-06T00:00:00", "type": "nessus", "title": "FreeBSD : dns/bind9* -- servers using DNS64 can be crashed by a crafted query (2892a8e2-3d68-11e2-8e01-0800273fe665)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-5688"], "modified": "2021-01-06T00:00:00", "cpe": ["p-cpe:/a:freebsd:freebsd:bind98", "p-cpe:/a:freebsd:freebsd:bind98-base", "p-cpe:/a:freebsd:freebsd:bind99", "p-cpe:/a:freebsd:freebsd:bind99-base", "cpe:/o:freebsd:freebsd"], "id": "FREEBSD_PKG_2892A8E23D6811E28E010800273FE665.NASL", "href": "https://www.tenable.com/plugins/nessus/63159", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the FreeBSD VuXML database :\n#\n# Copyright 2003-2018 Jacques Vidrine and contributors\n#\n# Redistribution and use in source (VuXML) and 'compiled' forms (SGML,\n# HTML, PDF, PostScript, RTF and so forth) with or without modification,\n# are permitted provided that the following conditions are met:\n# 1. Redistributions of source code (VuXML) must retain the above\n# copyright notice, this list of conditions and the following\n# disclaimer as the first lines of this file unmodified.\n# 2. Redistributions in compiled form (transformed to other DTDs,\n# published online in any format, converted to PDF, PostScript,\n# RTF and other formats) must reproduce the above copyright\n# notice, this list of conditions and the following disclaimer\n# in the documentation and/or other materials provided with the\n# distribution.\n# \n# THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS \"AS IS\"\n# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,\n# THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR\n# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS\n# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,\n# OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT\n# OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR\n# BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,\n# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE\n# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,\n# EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(63159);\n script_version(\"1.8\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2012-5688\");\n\n script_name(english:\"FreeBSD : dns/bind9* -- servers using DNS64 can be crashed by a crafted query (2892a8e2-3d68-11e2-8e01-0800273fe665)\");\n script_summary(english:\"Checks for updated packages in pkg_info output\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote FreeBSD host is missing one or more security-related\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"ISC reports :\n\nBIND 9 nameservers using the DNS64 IPv6 transition mechanism are\nvulnerable to a software defect that allows a crafted query to crash\nthe server with a REQUIRE assertion failure. Remote exploitation of\nthis defect can be achieved without extensive effort, resulting in a\ndenial-of-service (DoS) vector against affected servers.\"\n );\n # https://vuxml.freebsd.org/freebsd/2892a8e2-3d68-11e2-8e01-0800273fe665.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?4b834980\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:bind98\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:bind98-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:bind99\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:bind99-base\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:freebsd:freebsd\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2012/11/27\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2012/12/04\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2012/12/06\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2012-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"FreeBSD Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/FreeBSD/release\", \"Host/FreeBSD/pkg_info\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"freebsd_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/FreeBSD/release\")) audit(AUDIT_OS_NOT, \"FreeBSD\");\nif (!get_kb_item(\"Host/FreeBSD/pkg_info\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (pkg_test(save_report:TRUE, pkg:\"bind99<9.9.2.1\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"bind99-base<9.9.2.1\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"bind98<9.8.4.1\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"bind98-base<9.8.4.1\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:pkg_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2022-03-27T14:57:49", "description": "A flaw was found in the DNS64 implementation in BIND. If a remote attacker sent a specially crafted query to a named server, named could exit unexpectedly with an assertion failure. Note that DNS64 support is not enabled by default. (CVE-2012-5688)\n\nAfter installing the update, the BIND daemon (named) will be restarted automatically.", "cvss3": {"score": null, "vector": null}, "published": "2012-12-09T00:00:00", "type": "nessus", "title": "Scientific Linux Security Update : bind on SL6.x i386/x86_64 (20121206)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-5688"], "modified": "2021-01-14T00:00:00", "cpe": ["p-cpe:/a:fermilab:scientific_linux:bind", "p-cpe:/a:fermilab:scientific_linux:bind-chroot", "p-cpe:/a:fermilab:scientific_linux:bind-debuginfo", "p-cpe:/a:fermilab:scientific_linux:bind-devel", "p-cpe:/a:fermilab:scientific_linux:bind-libs", "p-cpe:/a:fermilab:scientific_linux:bind-sdb", "p-cpe:/a:fermilab:scientific_linux:bind-utils", "x-cpe:/o:fermilab:scientific_linux"], "id": "SL_20121206_BIND_ON_SL6_X.NASL", "href": "https://www.tenable.com/plugins/nessus/63191", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text is (C) Scientific Linux.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(63191);\n script_version(\"1.8\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2012-5688\");\n\n script_name(english:\"Scientific Linux Security Update : bind on SL6.x i386/x86_64 (20121206)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Scientific Linux host is missing one or more security\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"A flaw was found in the DNS64 implementation in BIND. If a remote\nattacker sent a specially crafted query to a named server, named could\nexit unexpectedly with an assertion failure. Note that DNS64 support\nis not enabled by default. (CVE-2012-5688)\n\nAfter installing the update, the BIND daemon (named) will be restarted\nautomatically.\"\n );\n # https://listserv.fnal.gov/scripts/wa.exe?A2=ind1212&L=scientific-linux-errata&T=0&P=434\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?01b1239e\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:bind\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:bind-chroot\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:bind-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:bind-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:bind-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:bind-sdb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:bind-utils\");\n script_set_attribute(attribute:\"cpe\", value:\"x-cpe:/o:fermilab:scientific_linux\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2012/12/06\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2012/12/06\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2012/12/09\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2012-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Scientific Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Scientific Linux \" >!< release) audit(AUDIT_HOST_NOT, \"running Scientific Linux\");\nos_ver = pregmatch(pattern: \"Scientific Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Scientific Linux\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^6([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Scientific Linux 6.x\", \"Scientific Linux \" + os_ver);\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu >!< \"x86_64\" && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Scientific Linux\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"SL6\", reference:\"bind-9.8.2-0.10.rc1.el6_3.6\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"bind-chroot-9.8.2-0.10.rc1.el6_3.6\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"bind-debuginfo-9.8.2-0.10.rc1.el6_3.6\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"bind-devel-9.8.2-0.10.rc1.el6_3.6\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"bind-libs-9.8.2-0.10.rc1.el6_3.6\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"bind-sdb-9.8.2-0.10.rc1.el6_3.6\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"bind-utils-9.8.2-0.10.rc1.el6_3.6\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"bind / bind-chroot / bind-debuginfo / bind-devel / bind-libs / etc\");\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2022-03-27T14:57:33", "description": "It was discovered that Bind incorrectly handled certain crafted queries when DNS64 was enabled. A remote attacker could use this flaw to cause Bind to crash, resulting in a denial of service.\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"score": null, "vector": null}, "published": "2012-12-07T00:00:00", "type": "nessus", "title": "Ubuntu 12.04 LTS / 12.10 : bind9 vulnerability (USN-1657-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-5688"], "modified": "2019-09-19T00:00:00", "cpe": ["p-cpe:/a:canonical:ubuntu_linux:bind9", "cpe:/o:canonical:ubuntu_linux:12.04:-:lts", "cpe:/o:canonical:ubuntu_linux:12.10"], "id": "UBUNTU_USN-1657-1.NASL", "href": "https://www.tenable.com/plugins/nessus/63184", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-1657-1. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(63184);\n script_version(\"1.11\");\n script_cvs_date(\"Date: 2019/09/19 12:54:28\");\n\n script_cve_id(\"CVE-2012-5688\");\n script_bugtraq_id(56817);\n script_xref(name:\"USN\", value:\"1657-1\");\n\n script_name(english:\"Ubuntu 12.04 LTS / 12.10 : bind9 vulnerability (USN-1657-1)\");\n script_summary(english:\"Checks dpkg output for updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Ubuntu host is missing a security-related patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"It was discovered that Bind incorrectly handled certain crafted\nqueries when DNS64 was enabled. A remote attacker could use this flaw\nto cause Bind to crash, resulting in a denial of service.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://usn.ubuntu.com/1657-1/\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected bind9 package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:bind9\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:12.04:-:lts\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:12.10\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2012/12/06\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2012/12/06\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2012/12/07\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2012-2019 Canonical, Inc. / NASL script (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"misc_func.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nrelease = chomp(release);\nif (! preg(pattern:\"^(12\\.04|12\\.10)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 12.04 / 12.10\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Ubuntu\", cpu);\n\nflag = 0;\n\nif (ubuntu_check(osver:\"12.04\", pkgname:\"bind9\", pkgver:\"1:9.8.1.dfsg.P1-4ubuntu0.5\")) flag++;\nif (ubuntu_check(osver:\"12.10\", pkgname:\"bind9\", pkgver:\"1:9.8.1.dfsg.P1-4.2ubuntu3.1\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"bind9\");\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2022-03-27T18:14:51", "description": "Problem description :\n\nDue to a software defect a crafted query can cause named(8) to crash with an assertion failure.", "cvss3": {"score": null, "vector": null}, "published": "2013-02-22T00:00:00", "type": "nessus", "title": "FreeBSD : FreeBSD -- BIND remote DoS with deliberately crafted DNS64 query (4671cdc9-7c6d-11e2-809b-6c626d99876c)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-5688"], "modified": "2021-01-06T00:00:00", "cpe": ["p-cpe:/a:freebsd:freebsd:FreeBSD", "cpe:/o:freebsd:freebsd"], "id": "FREEBSD_PKG_4671CDC97C6D11E2809B6C626D99876C.NASL", "href": "https://www.tenable.com/plugins/nessus/64792", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the FreeBSD VuXML database :\n#\n# Copyright 2003-2018 Jacques Vidrine and contributors\n#\n# Redistribution and use in source (VuXML) and 'compiled' forms (SGML,\n# HTML, PDF, PostScript, RTF and so forth) with or without modification,\n# are permitted provided that the following conditions are met:\n# 1. Redistributions of source code (VuXML) must retain the above\n# copyright notice, this list of conditions and the following\n# disclaimer as the first lines of this file unmodified.\n# 2. Redistributions in compiled form (transformed to other DTDs,\n# published online in any format, converted to PDF, PostScript,\n# RTF and other formats) must reproduce the above copyright\n# notice, this list of conditions and the following disclaimer\n# in the documentation and/or other materials provided with the\n# distribution.\n# \n# THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS \"AS IS\"\n# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,\n# THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR\n# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS\n# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,\n# OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT\n# OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR\n# BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,\n# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE\n# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,\n# EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(64792);\n script_version(\"1.11\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2012-5688\");\n script_bugtraq_id(56817);\n script_xref(name:\"FreeBSD\", value:\"SA-13:01.bind\");\n\n script_name(english:\"FreeBSD : FreeBSD -- BIND remote DoS with deliberately crafted DNS64 query (4671cdc9-7c6d-11e2-809b-6c626d99876c)\");\n script_summary(english:\"Checks for updated packages in pkg_info output\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote FreeBSD host is missing one or more security-related\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Problem description :\n\nDue to a software defect a crafted query can cause named(8) to crash\nwith an assertion failure.\"\n );\n # https://vuxml.freebsd.org/freebsd/4671cdc9-7c6d-11e2-809b-6c626d99876c.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?456cec2a\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:FreeBSD\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:freebsd:freebsd\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2013/02/19\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2013/02/21\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/02/22\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2013-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"FreeBSD Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/FreeBSD/release\", \"Host/FreeBSD/pkg_info\", \"Settings/ParanoidReport\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"freebsd_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/FreeBSD/release\")) audit(AUDIT_OS_NOT, \"FreeBSD\");\nif (!get_kb_item(\"Host/FreeBSD/pkg_info\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nif (report_paranoia < 2) audit(AUDIT_PARANOID);\n\nflag = 0;\n\nif (pkg_test(save_report:TRUE, pkg:\"FreeBSD>=9.0<9.0_6\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"FreeBSD>=9.1<9.1_1\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:pkg_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2022-03-27T14:57:40", "description": "This update fixes CVE-2012-5688.\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"score": null, "vector": null}, "published": "2012-12-11T00:00:00", "type": "nessus", "title": "Fedora 18 : bind-9.9.2-5.P1.fc18 (2012-19777)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-5688"], "modified": "2021-01-11T00:00:00", "cpe": ["p-cpe:/a:fedoraproject:fedora:bind", "cpe:/o:fedoraproject:fedora:18"], "id": "FEDORA_2012-19777.NASL", "href": "https://www.tenable.com/plugins/nessus/63215", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2012-19777.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(63215);\n script_version(\"1.13\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2012-5688\");\n script_bugtraq_id(56817);\n script_xref(name:\"FEDORA\", value:\"2012-19777\");\n\n script_name(english:\"Fedora 18 : bind-9.9.2-5.P1.fc18 (2012-19777)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update fixes CVE-2012-5688.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=883533\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2012-December/094250.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?16c16761\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected bind package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:bind\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:18\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2012/12/05\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2012/12/11\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2012-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^18([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 18.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC18\", reference:\"bind-9.9.2-5.P1.fc18\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"bind\");\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2022-03-27T14:58:03", "description": "Updated bind packages that fix one security issue are now available for Red Hat Enterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section.\n\nThe Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. DNS64 is used to automatically generate DNS records so IPv6 based clients can access IPv4 systems through a NAT64 server.\n\nA flaw was found in the DNS64 implementation in BIND. If a remote attacker sent a specially crafted query to a named server, named could exit unexpectedly with an assertion failure. Note that DNS64 support is not enabled by default. (CVE-2012-5688)\n\nUsers of bind are advised to upgrade to these updated packages, which correct this issue. After installing the update, the BIND daemon (named) will be restarted automatically.", "cvss3": {"score": null, "vector": null}, "published": "2012-12-07T00:00:00", "type": "nessus", "title": "RHEL 6 : bind (RHSA-2012:1549)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-5688"], "modified": "2021-01-14T00:00:00", "cpe": ["p-cpe:/a:redhat:enterprise_linux:bind", "p-cpe:/a:redhat:enterprise_linux:bind-chroot", "p-cpe:/a:redhat:enterprise_linux:bind-debuginfo", "p-cpe:/a:redhat:enterprise_linux:bind-devel", "p-cpe:/a:redhat:enterprise_linux:bind-libs", "p-cpe:/a:redhat:enterprise_linux:bind-sdb", "p-cpe:/a:redhat:enterprise_linux:bind-utils", "cpe:/o:redhat:enterprise_linux:6", "cpe:/o:redhat:enterprise_linux:6.3"], "id": "REDHAT-RHSA-2012-1549.NASL", "href": "https://www.tenable.com/plugins/nessus/63182", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2012:1549. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(63182);\n script_version(\"1.28\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2012-5688\");\n script_bugtraq_id(56817);\n script_xref(name:\"RHSA\", value:\"2012:1549\");\n\n script_name(english:\"RHEL 6 : bind (RHSA-2012:1549)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated bind packages that fix one security issue are now available\nfor Red Hat Enterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. A Common Vulnerability Scoring System\n(CVSS) base score, which gives a detailed severity rating, is\navailable from the CVE link in the References section.\n\nThe Berkeley Internet Name Domain (BIND) is an implementation of the\nDomain Name System (DNS) protocols. BIND includes a DNS server\n(named); a resolver library (routines for applications to use when\ninterfacing with DNS); and tools for verifying that the DNS server is\noperating correctly. DNS64 is used to automatically generate DNS\nrecords so IPv6 based clients can access IPv4 systems through a NAT64\nserver.\n\nA flaw was found in the DNS64 implementation in BIND. If a remote\nattacker sent a specially crafted query to a named server, named could\nexit unexpectedly with an assertion failure. Note that DNS64 support\nis not enabled by default. (CVE-2012-5688)\n\nUsers of bind are advised to upgrade to these updated packages, which\ncorrect this issue. After installing the update, the BIND daemon\n(named) will be restarted automatically.\"\n );\n # http://www.isc.org/software/bind/advisories/cve-2012-5688\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?486e413c\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2012:1549\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2012-5688\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:bind\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:bind-chroot\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:bind-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:bind-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:bind-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:bind-sdb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:bind-utils\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:6\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:6.3\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2012/12/06\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2012/12/06\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2012/12/07\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2012-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^6([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 6.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2012:1549\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"bind-9.8.2-0.10.rc1.el6_3.6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"bind-9.8.2-0.10.rc1.el6_3.6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"bind-9.8.2-0.10.rc1.el6_3.6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"bind-chroot-9.8.2-0.10.rc1.el6_3.6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"bind-chroot-9.8.2-0.10.rc1.el6_3.6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"bind-chroot-9.8.2-0.10.rc1.el6_3.6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", reference:\"bind-debuginfo-9.8.2-0.10.rc1.el6_3.6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", reference:\"bind-devel-9.8.2-0.10.rc1.el6_3.6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", reference:\"bind-libs-9.8.2-0.10.rc1.el6_3.6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"bind-sdb-9.8.2-0.10.rc1.el6_3.6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"bind-sdb-9.8.2-0.10.rc1.el6_3.6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"bind-sdb-9.8.2-0.10.rc1.el6_3.6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"bind-utils-9.8.2-0.10.rc1.el6_3.6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"bind-utils-9.8.2-0.10.rc1.el6_3.6\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"bind-utils-9.8.2-0.10.rc1.el6_3.6\")) flag++;\n\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"bind / bind-chroot / bind-debuginfo / bind-devel / bind-libs / etc\");\n }\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2022-03-27T18:27:27", "description": "From Red Hat Security Advisory 2012:1549 :\n\nUpdated bind packages that fix one security issue are now available for Red Hat Enterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section.\n\nThe Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. DNS64 is used to automatically generate DNS records so IPv6 based clients can access IPv4 systems through a NAT64 server.\n\nA flaw was found in the DNS64 implementation in BIND. If a remote attacker sent a specially crafted query to a named server, named could exit unexpectedly with an assertion failure. Note that DNS64 support is not enabled by default. (CVE-2012-5688)\n\nUsers of bind are advised to upgrade to these updated packages, which correct this issue. After installing the update, the BIND daemon (named) will be restarted automatically.", "cvss3": {"score": null, "vector": null}, "published": "2013-07-12T00:00:00", "type": "nessus", "title": "Oracle Linux 6 : bind (ELSA-2012-1549)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-5688"], "modified": "2021-01-14T00:00:00", "cpe": ["p-cpe:/a:oracle:linux:bind", "p-cpe:/a:oracle:linux:bind-chroot", "p-cpe:/a:oracle:linux:bind-devel", "p-cpe:/a:oracle:linux:bind-libs", "p-cpe:/a:oracle:linux:bind-sdb", "p-cpe:/a:oracle:linux:bind-utils", "cpe:/o:oracle:linux:6"], "id": "ORACLELINUX_ELSA-2012-1549.NASL", "href": "https://www.tenable.com/plugins/nessus/68664", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Red Hat Security Advisory RHSA-2012:1549 and \n# Oracle Linux Security Advisory ELSA-2012-1549 respectively.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(68664);\n script_version(\"1.10\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2012-5688\");\n script_bugtraq_id(56817);\n script_xref(name:\"RHSA\", value:\"2012:1549\");\n\n script_name(english:\"Oracle Linux 6 : bind (ELSA-2012-1549)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Oracle Linux host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"From Red Hat Security Advisory 2012:1549 :\n\nUpdated bind packages that fix one security issue are now available\nfor Red Hat Enterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. A Common Vulnerability Scoring System\n(CVSS) base score, which gives a detailed severity rating, is\navailable from the CVE link in the References section.\n\nThe Berkeley Internet Name Domain (BIND) is an implementation of the\nDomain Name System (DNS) protocols. BIND includes a DNS server\n(named); a resolver library (routines for applications to use when\ninterfacing with DNS); and tools for verifying that the DNS server is\noperating correctly. DNS64 is used to automatically generate DNS\nrecords so IPv6 based clients can access IPv4 systems through a NAT64\nserver.\n\nA flaw was found in the DNS64 implementation in BIND. If a remote\nattacker sent a specially crafted query to a named server, named could\nexit unexpectedly with an assertion failure. Note that DNS64 support\nis not enabled by default. (CVE-2012-5688)\n\nUsers of bind are advised to upgrade to these updated packages, which\ncorrect this issue. After installing the update, the BIND daemon\n(named) will be restarted automatically.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://oss.oracle.com/pipermail/el-errata/2012-December/003162.html\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected bind packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:bind\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:bind-chroot\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:bind-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:bind-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:bind-sdb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:bind-utils\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:6\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2012/12/06\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2012/12/06\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/07/12\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2013-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Oracle Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/OracleLinux\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/OracleLinux\")) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || !pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux)\", string:release)) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nos_ver = pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux) .*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Oracle Linux\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^6([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Oracle Linux 6\", \"Oracle Linux \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Oracle Linux\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"EL6\", reference:\"bind-9.8.2-0.10.rc1.el6_3.6\")) flag++;\nif (rpm_check(release:\"EL6\", reference:\"bind-chroot-9.8.2-0.10.rc1.el6_3.6\")) flag++;\nif (rpm_check(release:\"EL6\", reference:\"bind-devel-9.8.2-0.10.rc1.el6_3.6\")) flag++;\nif (rpm_check(release:\"EL6\", reference:\"bind-libs-9.8.2-0.10.rc1.el6_3.6\")) flag++;\nif (rpm_check(release:\"EL6\", reference:\"bind-sdb-9.8.2-0.10.rc1.el6_3.6\")) flag++;\nif (rpm_check(release:\"EL6\", reference:\"bind-utils-9.8.2-0.10.rc1.el6_3.6\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"bind / bind-chroot / bind-devel / bind-libs / bind-sdb / bind-utils\");\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2021-08-19T12:17:51", "description": "New bind packages are available for Slackware 12.1, 12.2, 13.0, 13.1, 13.37, 14.0, and -current to fix security issues.", "cvss3": {"score": null, "vector": null}, "published": "2012-12-07T00:00:00", "type": "nessus", "title": "Slackware 12.1 / 12.2 / 13.0 / 13.1 / 13.37 / 14.0 / current : bind (SSA:2012-341-01)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-1667", "CVE-2012-3817", "CVE-2012-3868", "CVE-2012-5166", "CVE-2012-5688"], "modified": "2021-01-14T00:00:00", "cpe": ["p-cpe:/a:slackware:slackware_linux:bind", "cpe:/o:slackware:slackware_linux", "cpe:/o:slackware:slackware_linux:12.1", "cpe:/o:slackware:slackware_linux:12.2", "cpe:/o:slackware:slackware_linux:13.0", "cpe:/o:slackware:slackware_linux:13.1", "cpe:/o:slackware:slackware_linux:13.37", "cpe:/o:slackware:slackware_linux:14.0"], "id": "SLACKWARE_SSA_2012-341-01.NASL", "href": "https://www.tenable.com/plugins/nessus/63167", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Slackware Security Advisory 2012-341-01. The text \n# itself is copyright (C) Slackware Linux, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(63167);\n script_version(\"1.7\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2012-1667\", \"CVE-2012-3817\", \"CVE-2012-3868\", \"CVE-2012-5166\", \"CVE-2012-5688\");\n script_xref(name:\"SSA\", value:\"2012-341-01\");\n\n script_name(english:\"Slackware 12.1 / 12.2 / 13.0 / 13.1 / 13.37 / 14.0 / current : bind (SSA:2012-341-01)\");\n script_summary(english:\"Checks for updated package in /var/log/packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Slackware host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"New bind packages are available for Slackware 12.1, 12.2, 13.0, 13.1,\n13.37, 14.0, and -current to fix security issues.\"\n );\n # http://www.slackware.com/security/viewer.php?l=slackware-security&y=2012&m=slackware-security.536004\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?059c79a8\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected bind package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:C\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:slackware:slackware_linux:bind\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:slackware:slackware_linux\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:slackware:slackware_linux:12.1\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:slackware:slackware_linux:12.2\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:slackware:slackware_linux:13.0\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:slackware:slackware_linux:13.1\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:slackware:slackware_linux:13.37\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:slackware:slackware_linux:14.0\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2012/12/06\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2012/12/07\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2012-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Slackware Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Slackware/release\", \"Host/Slackware/packages\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"slackware.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Slackware/release\")) audit(AUDIT_OS_NOT, \"Slackware\");\nif (!get_kb_item(\"Host/Slackware/packages\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Slackware\", cpu);\n\n\nflag = 0;\nif (slackware_check(osver:\"12.1\", pkgname:\"bind\", pkgver:\"9.8.4_P1\", pkgarch:\"i486\", pkgnum:\"1_slack12.1\")) flag++;\n\nif (slackware_check(osver:\"12.2\", pkgname:\"bind\", pkgver:\"9.8.4_P1\", pkgarch:\"i486\", pkgnum:\"1_slack12.2\")) flag++;\n\nif (slackware_check(osver:\"13.0\", pkgname:\"bind\", pkgver:\"9.8.4_P1\", pkgarch:\"i486\", pkgnum:\"1_slack13.0\")) flag++;\nif (slackware_check(osver:\"13.0\", arch:\"x86_64\", pkgname:\"bind\", pkgver:\"9.8.4_P1\", pkgarch:\"x86_64\", pkgnum:\"1_slack13.0\")) flag++;\n\nif (slackware_check(osver:\"13.1\", pkgname:\"bind\", pkgver:\"9.8.4_P1\", pkgarch:\"i486\", pkgnum:\"1_slack13.1\")) flag++;\nif (slackware_check(osver:\"13.1\", arch:\"x86_64\", pkgname:\"bind\", pkgver:\"9.8.4_P1\", pkgarch:\"x86_64\", pkgnum:\"1_slack13.1\")) flag++;\n\nif (slackware_check(osver:\"13.37\", pkgname:\"bind\", pkgver:\"9.8.4_P1\", pkgarch:\"i486\", pkgnum:\"1_slack13.37\")) flag++;\nif (slackware_check(osver:\"13.37\", arch:\"x86_64\", pkgname:\"bind\", pkgver:\"9.8.4_P1\", pkgarch:\"x86_64\", pkgnum:\"1_slack13.37\")) flag++;\n\nif (slackware_check(osver:\"14.0\", pkgname:\"bind\", pkgver:\"9.9.2_P1\", pkgarch:\"i486\", pkgnum:\"1_slack14.0\")) flag++;\nif (slackware_check(osver:\"14.0\", arch:\"x86_64\", pkgname:\"bind\", pkgver:\"9.9.2_P1\", pkgarch:\"x86_64\", pkgnum:\"1_slack14.0\")) flag++;\n\nif (slackware_check(osver:\"current\", pkgname:\"bind\", pkgver:\"9.9.2_P1\", pkgarch:\"i486\", pkgnum:\"1\")) flag++;\nif (slackware_check(osver:\"current\", arch:\"x86_64\", pkgname:\"bind\", pkgver:\"9.9.2_P1\", pkgarch:\"x86_64\", pkgnum:\"1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:slackware_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 8.5, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:C"}}, {"lastseen": "2021-08-19T12:51:03", "description": "The remote host is affected by the vulnerability described in GLSA-201401-34 (BIND: Denial of Service)\n\n Multiple vulnerabilities have been discovered in BIND. Please review the CVE identifiers referenced below for details.\n Impact :\n\n A remote attacker may be able to cause a Denial of Service condition.\n Workaround :\n\n There is no known workaround at this time.", "cvss3": {"score": null, "vector": null}, "published": "2014-01-30T00:00:00", "type": "nessus", "title": "GLSA-201401-34 : BIND: Denial of Service", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-5166", "CVE-2012-5688", "CVE-2012-5689", "CVE-2013-2266", "CVE-2013-3919", "CVE-2013-4854", "CVE-2014-0591"], "modified": "2021-01-06T00:00:00", "cpe": ["p-cpe:/a:gentoo:linux:bind", "cpe:/o:gentoo:linux"], "id": "GENTOO_GLSA-201401-34.NASL", "href": "https://www.tenable.com/plugins/nessus/72208", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Gentoo Linux Security Advisory GLSA 201401-34.\n#\n# The advisory text is Copyright (C) 2001-2015 Gentoo Foundation, Inc.\n# and licensed under the Creative Commons - Attribution / Share Alike \n# license. See http://creativecommons.org/licenses/by-sa/3.0/\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(72208);\n script_version(\"1.11\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2012-5166\", \"CVE-2012-5688\", \"CVE-2012-5689\", \"CVE-2013-2266\", \"CVE-2013-3919\", \"CVE-2013-4854\", \"CVE-2014-0591\");\n script_bugtraq_id(55852, 56817, 57556, 58736, 60338, 61479, 64801);\n script_xref(name:\"GLSA\", value:\"201401-34\");\n\n script_name(english:\"GLSA-201401-34 : BIND: Denial of Service\");\n script_summary(english:\"Checks for updated package(s) in /var/db/pkg\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Gentoo host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The remote host is affected by the vulnerability described in GLSA-201401-34\n(BIND: Denial of Service)\n\n Multiple vulnerabilities have been discovered in BIND. Please review the\n CVE identifiers referenced below for details.\n \nImpact :\n\n A remote attacker may be able to cause a Denial of Service condition.\n \nWorkaround :\n\n There is no known workaround at this time.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security.gentoo.org/glsa/201401-34\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"All BIND users should upgrade to the latest version:\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=net-dns/bind-9.9.4_p2'\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:gentoo:linux:bind\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:gentoo:linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/01/29\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/01/30\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Gentoo Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Gentoo/release\", \"Host/Gentoo/qpkg-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"qpkg.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Gentoo/release\")) audit(AUDIT_OS_NOT, \"Gentoo\");\nif (!get_kb_item(\"Host/Gentoo/qpkg-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (qpkg_check(package:\"net-dns/bind\", unaffected:make_list(\"ge 9.9.4_p2\"), vulnerable:make_list(\"lt 9.9.4_p2\"))) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:qpkg_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = qpkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"BIND\");\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2021-08-19T12:49:48", "description": "bind was updated to 9.8.4-P2 to fix security problems and bugs.\n\nSecurity Fixes Removed the check for regex.h in configure in order to disable regex syntax checking, as it exposes BIND to a critical flaw in libregex on some platforms. [CVE-2013-2266] [RT #32688] https://kb.isc.org/article/AA-00871 (bnc#811876) Prevents named from aborting with a require assertion failure on servers with DNS64 enabled. These crashes might occur as a result of specific queries that are received. (Note that this fix is a subset of a series of updates that will be included in full in BIND 9.8.5 and 9.9.3 as change #3388, RT #30996). [CVE-2012-5688] [RT #30792] A deliberately constructed combination of records could cause named to hang while populating the additional section of a response. [CVE-2012-5166] [RT #31090] Prevents a named assert (crash) when queried for a record whose RDATA exceeds 65535 bytes [CVE-2012-4244] [RT #30416] Prevents a named assert (crash) when validating caused by using 'Bad cache' data before it has been initialized. [CVE-2012-3817] [RT #30025] A condition has been corrected where improper handling of zero-length RDATA could cause undesirable behavior, including termination of the named process. [CVE-2012-1667] [RT #29644] New Features Elliptic Curve Digital Signature Algorithm keys and signatures in DNSSEC are now supported per RFC 6605. [RT #21918] Feature Changes Improves OpenSSL error logging [RT #29932] nslookup now returns a nonzero exit code when it is unable to get an answer. [RT #29492] Bug Fixes Uses binary mode to open raw files on Windows. [RT #30944] Static-stub zones now accept 'forward' and 'fowarders' options (often needed for subdomains of the zone referenced to override global forwarding options). These options are already available with traditional stub zones and their omission from zones of type 'static-stub' was an inadvertent oversight. [RT #30482] Limits the TTL of signed RRsets in cache when their RRSIGs are approaching expiry. This prevents the persistence in cache of invalid RRSIGs in order to assist recovery from a situation where zone re-signing doesn't occur in a timely manner. With this change, named will attempt to obtain new RRSIGs from the authoritative server once the original ones have expired, and even if the TTL of the old records would in other circumstances cause them to be kept in cache for longer. [RT #26429] Corrects the syntax of isc_atomic_xadd() and isc_atomic_cmpxchg() which are employed on Itanium systems to speed up lock management by making use of atomic operations. Without the syntax correction it is possible that concurrent access to the same structures could accidentally occur with unpredictable results.\n[RT #25181] The configure script now supports and detects libxml2-2.8.x correctly [RT #30440] The host command should no longer assert on some architectures and builds while handling the time values used with the -w (wait forever) option. [RT #18723] Invalid zero settings for max-retry-time, min-retry-time, max-refresh-time, min-refresh-time will now be detected during parsing of named.conf and an error emitted instead of triggering an assertion failure on startup. [RT #27730] Removes spurious newlines from log messages in zone.c [RT #30675] When built with readline support (i.e. on a system with readline installed) nsupdate no longer terminates unexpectedly in interactive mode. [RT #29550] All named tasks that perform task-exclusive operations now share the same single task. Prior to this change, there was the possibility of a race condition between rndc operations and other functions such as re-sizing the adb hash table. If the race condition was encountered, named would in most cases terminate unexpectedly with an assert. [RT #29872] Ensures that servers are expired from the ADB cache when the timeout limit is reached so that their learned attributes can be refreshed. Prior to this change, servers that were frequently queried might never have their entries removed and reinitialized. This is of particular importance to DNSSEC-validating recursive servers that might erroneously set 'no-edns' for an authoritative server following a period of intermittent connectivity. [RT #29856] Adds additional resilience to a previous security change (3218) by preventing RRSIG data from being added to cache when a pseudo-record matching the covering type and proving non-existence exists at a higher trust level. The earlier change prevented this inconsistent data from being retrieved from cache in response to client queries - with this additional change, the RRSIG records are no longer inserted into cache at all. [RT #26809] dnssec-settime will now issue a warning when the writing of a new private key file would cause a change in the permissions of the existing file. [RT #27724] Fixes the defect introduced by change #3314 that was causing failures when saving stub zones to disk (resulting in excessive CPU usage in some cases). [RT #29952] It is now possible to using multiple control keys again - this functionality was inadvertently broken by change #3924 (RT #28265) which addressed a memory leak. [RT #29694] Setting resolver-query-timeout too low could cause named problems recovering after a loss of connectivity. [RT #29623] Reduces the potential build-up of stale RRsets in cache on a busy recursive nameserver by re-using cached DS and RRSIG rrsets when possible [RT #29446] Corrects a failure to authenticate non-existence of resource records in some circumstances when RPZ has been configured. Also :\n\n - adds an optional 'recursive-only yes|no' to the response-policy statement\n\n - adds an optional 'max-policy-ttl' to the response-policy statement to limit the false data that 'recursive-only no' can introduce into resolvers' caches\n\n - introduces a predefined encoding of PASSTHRU policy by adding 'rpz-passthru' to be used as the target of CNAME policy records (the old encoding is still accepted.)\n\n - adds a RPZ performance test to bin/tests/system/rpz when queryperf is available. [RT #26172] Upper-case/lower-case handling of RRSIG signer-names is now handled consistently: RRSIG records are generated with the signer-name in lower case. They are accepted with any case, but if they fail to validate, we try again in lower case. [RT #27451]\n\n - Update the IPv4 address of the D root name server.", "cvss3": {"score": null, "vector": null}, "published": "2014-06-13T00:00:00", "type": "nessus", "title": "openSUSE Security Update : bind (openSUSE-SU-2013:0605-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-1667", "CVE-2012-3817", "CVE-2012-3868", "CVE-2012-4244", "CVE-2012-5166", "CVE-2012-5688", "CVE-2013-2266"], "modified": "2021-01-19T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:bind", "p-cpe:/a:novell:opensuse:bind-chrootenv", "p-cpe:/a:novell:opensuse:bind-debuginfo", "p-cpe:/a:novell:opensuse:bind-debugsource", "p-cpe:/a:novell:opensuse:bind-devel", "p-cpe:/a:novell:opensuse:bind-libs", "p-cpe:/a:novell:opensuse:bind-libs-32bit", "p-cpe:/a:novell:opensuse:bind-libs-debuginfo", "p-cpe:/a:novell:opensuse:bind-libs-debuginfo-32bit", "p-cpe:/a:novell:opensuse:bind-lwresd", "p-cpe:/a:novell:opensuse:bind-lwresd-debuginfo", "p-cpe:/a:novell:opensuse:bind-utils", "p-cpe:/a:novell:opensuse:bind-utils-debuginfo", "cpe:/o:novell:opensuse:12.1"], "id": "OPENSUSE-2013-296.NASL", "href": "https://www.tenable.com/plugins/nessus/74953", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update openSUSE-2013-296.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(74953);\n script_version(\"1.7\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2012-1667\", \"CVE-2012-3817\", \"CVE-2012-3868\", \"CVE-2012-4244\", \"CVE-2012-5166\", \"CVE-2012-5688\", \"CVE-2013-2266\");\n\n script_name(english:\"openSUSE Security Update : bind (openSUSE-SU-2013:0605-1)\");\n script_summary(english:\"Check for the openSUSE-2013-296 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"bind was updated to 9.8.4-P2 to fix security problems and bugs.\n\nSecurity Fixes Removed the check for regex.h in configure in order to\ndisable regex syntax checking, as it exposes BIND to a critical flaw\nin libregex on some platforms. [CVE-2013-2266] [RT #32688]\nhttps://kb.isc.org/article/AA-00871 (bnc#811876) Prevents named from\naborting with a require assertion failure on servers with DNS64\nenabled. These crashes might occur as a result of specific queries\nthat are received. (Note that this fix is a subset of a series of\nupdates that will be included in full in BIND 9.8.5 and 9.9.3 as\nchange #3388, RT #30996). [CVE-2012-5688] [RT #30792] A deliberately\nconstructed combination of records could cause named to hang while\npopulating the additional section of a response. [CVE-2012-5166] [RT\n#31090] Prevents a named assert (crash) when queried for a record\nwhose RDATA exceeds 65535 bytes [CVE-2012-4244] [RT #30416] Prevents a\nnamed assert (crash) when validating caused by using 'Bad cache' data\nbefore it has been initialized. [CVE-2012-3817] [RT #30025] A\ncondition has been corrected where improper handling of zero-length\nRDATA could cause undesirable behavior, including termination of the\nnamed process. [CVE-2012-1667] [RT #29644] New Features Elliptic Curve\nDigital Signature Algorithm keys and signatures in DNSSEC are now\nsupported per RFC 6605. [RT #21918] Feature Changes Improves OpenSSL\nerror logging [RT #29932] nslookup now returns a nonzero exit code\nwhen it is unable to get an answer. [RT #29492] Bug Fixes Uses binary\nmode to open raw files on Windows. [RT #30944] Static-stub zones now\naccept 'forward' and 'fowarders' options (often needed for subdomains\nof the zone referenced to override global forwarding options). These\noptions are already available with traditional stub zones and their\nomission from zones of type 'static-stub' was an inadvertent\noversight. [RT #30482] Limits the TTL of signed RRsets in cache when\ntheir RRSIGs are approaching expiry. This prevents the persistence in\ncache of invalid RRSIGs in order to assist recovery from a situation\nwhere zone re-signing doesn't occur in a timely manner. With this\nchange, named will attempt to obtain new RRSIGs from the authoritative\nserver once the original ones have expired, and even if the TTL of the\nold records would in other circumstances cause them to be kept in\ncache for longer. [RT #26429] Corrects the syntax of isc_atomic_xadd()\nand isc_atomic_cmpxchg() which are employed on Itanium systems to\nspeed up lock management by making use of atomic operations. Without\nthe syntax correction it is possible that concurrent access to the\nsame structures could accidentally occur with unpredictable results.\n[RT #25181] The configure script now supports and detects\nlibxml2-2.8.x correctly [RT #30440] The host command should no longer\nassert on some architectures and builds while handling the time values\nused with the -w (wait forever) option. [RT #18723] Invalid zero\nsettings for max-retry-time, min-retry-time, max-refresh-time,\nmin-refresh-time will now be detected during parsing of named.conf and\nan error emitted instead of triggering an assertion failure on\nstartup. [RT #27730] Removes spurious newlines from log messages in\nzone.c [RT #30675] When built with readline support (i.e. on a system\nwith readline installed) nsupdate no longer terminates unexpectedly in\ninteractive mode. [RT #29550] All named tasks that perform\ntask-exclusive operations now share the same single task. Prior to\nthis change, there was the possibility of a race condition between\nrndc operations and other functions such as re-sizing the adb hash\ntable. If the race condition was encountered, named would in most\ncases terminate unexpectedly with an assert. [RT #29872] Ensures that\nservers are expired from the ADB cache when the timeout limit is\nreached so that their learned attributes can be refreshed. Prior to\nthis change, servers that were frequently queried might never have\ntheir entries removed and reinitialized. This is of particular\nimportance to DNSSEC-validating recursive servers that might\nerroneously set 'no-edns' for an authoritative server following a\nperiod of intermittent connectivity. [RT #29856] Adds additional\nresilience to a previous security change (3218) by preventing RRSIG\ndata from being added to cache when a pseudo-record matching the\ncovering type and proving non-existence exists at a higher trust\nlevel. The earlier change prevented this inconsistent data from being\nretrieved from cache in response to client queries - with this\nadditional change, the RRSIG records are no longer inserted into cache\nat all. [RT #26809] dnssec-settime will now issue a warning when the\nwriting of a new private key file would cause a change in the\npermissions of the existing file. [RT #27724] Fixes the defect\nintroduced by change #3314 that was causing failures when saving stub\nzones to disk (resulting in excessive CPU usage in some cases). [RT\n#29952] It is now possible to using multiple control keys again - this\nfunctionality was inadvertently broken by change #3924 (RT #28265)\nwhich addressed a memory leak. [RT #29694] Setting\nresolver-query-timeout too low could cause named problems recovering\nafter a loss of connectivity. [RT #29623] Reduces the potential\nbuild-up of stale RRsets in cache on a busy recursive nameserver by\nre-using cached DS and RRSIG rrsets when possible [RT #29446] Corrects\na failure to authenticate non-existence of resource records in some\ncircumstances when RPZ has been configured. Also :\n\n - adds an optional 'recursive-only yes|no' to the\n response-policy statement\n\n - adds an optional 'max-policy-ttl' to the response-policy\n statement to limit the false data that 'recursive-only\n no' can introduce into resolvers' caches\n\n - introduces a predefined encoding of PASSTHRU policy by\n adding 'rpz-passthru' to be used as the target of CNAME\n policy records (the old encoding is still accepted.)\n\n - adds a RPZ performance test to bin/tests/system/rpz when\n queryperf is available. [RT #26172]\n Upper-case/lower-case handling of RRSIG signer-names is\n now handled consistently: RRSIG records are generated\n with the signer-name in lower case. They are accepted\n with any case, but if they fail to validate, we try\n again in lower case. [RT #27451]\n\n - Update the IPv4 address of the D root name server.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=811876\"\n );\n # https://kb.isc.org/article/AA-00871\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://kb.isc.org/docs/aa-00871\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://lists.opensuse.org/opensuse-updates/2013-04/msg00035.html\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected bind packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:bind\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:bind-chrootenv\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:bind-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:bind-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:bind-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:bind-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:bind-libs-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:bind-libs-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:bind-libs-debuginfo-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:bind-lwresd\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:bind-lwresd-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:bind-utils\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:bind-utils-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:12.1\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2013/03/27\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/06/13\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE12\\.1)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"12.1\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686|x86_64)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686 / x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE12.1\", reference:\"bind-9.8.4P2-4.32.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.1\", reference:\"bind-chrootenv-9.8.4P2-4.32.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.1\", reference:\"bind-debuginfo-9.8.4P2-4.32.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.1\", reference:\"bind-debugsource-9.8.4P2-4.32.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.1\", reference:\"bind-devel-9.8.4P2-4.32.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.1\", reference:\"bind-libs-9.8.4P2-4.32.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.1\", reference:\"bind-libs-debuginfo-9.8.4P2-4.32.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.1\", reference:\"bind-lwresd-9.8.4P2-4.32.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.1\", reference:\"bind-lwresd-debuginfo-9.8.4P2-4.32.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.1\", reference:\"bind-utils-9.8.4P2-4.32.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.1\", reference:\"bind-utils-debuginfo-9.8.4P2-4.32.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.1\", cpu:\"x86_64\", reference:\"bind-libs-32bit-9.8.4P2-4.32.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.1\", cpu:\"x86_64\", reference:\"bind-libs-debuginfo-32bit-9.8.4P2-4.32.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"bind\");\n}\n", "cvss": {"score": 8.5, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:C"}}, {"lastseen": "2022-06-16T14:15:15", "description": "The remote host is running a version of Mac OS X 10.6 or 10.7 that does not have Security Update 2013-004 applied. This update contains several security-related fixes for the following component :\n\n - Apache\n - Bind\n - Certificate Trust Policy\n - ClamAV\n - Installer\n - IPSec\n - Mobile Device Management\n - OpenSSL\n - PHP\n - PostgreSQL\n - QuickTime\n - sudo\n\nNote that successful exploitation of the most serious issues could result in arbitrary code execution.", "cvss3": {"score": null, "vector": null}, "published": "2013-09-13T00:00:00", "type": "nessus", "title": "Mac OS X Multiple Vulnerabilities (Security Update 2013-004)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-0883", "CVE-2012-2686", "CVE-2012-2687", "CVE-2012-3499", "CVE-2012-3817", "CVE-2012-4244", "CVE-2012-4558", "CVE-2012-5166", "CVE-2012-5688", "CVE-2013-0166", "CVE-2013-0169", "CVE-2013-1027", "CVE-2013-1028", "CVE-2013-1030", "CVE-2013-1032", "CVE-2013-1635", "CVE-2013-1643", "CVE-2013-1775", "CVE-2013-1824", "CVE-2013-1899", "CVE-2013-1900", "CVE-2013-1901", "CVE-2013-1902", "CVE-2013-1903", "CVE-2013-2020", "CVE-2013-2021", "CVE-2013-2110", "CVE-2013-2266"], "modified": "2018-07-14T00:00:00", "cpe": ["cpe:/o:apple:mac_os_x"], "id": "MACOSX_SECUPD2013-004.NASL", "href": "https://www.tenable.com/plugins/nessus/69878", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\n\ninclude(\"compat.inc\");\n\n\nif (description)\n{\n script_id(69878);\n script_version(\"1.18\");\n script_cvs_date(\"Date: 2018/07/14 1:59:36\");\n\n script_cve_id(\n \"CVE-2012-0883\",\n \"CVE-2012-2686\",\n \"CVE-2012-2687\",\n \"CVE-2012-3499\",\n \"CVE-2012-3817\",\n \"CVE-2012-4244\",\n \"CVE-2012-4558\",\n \"CVE-2012-5166\",\n \"CVE-2012-5688\",\n \"CVE-2013-0166\",\n \"CVE-2013-0169\",\n \"CVE-2013-1027\",\n \"CVE-2013-1028\",\n \"CVE-2013-1030\",\n \"CVE-2013-1032\",\n \"CVE-2013-1635\",\n \"CVE-2013-1643\",\n \"CVE-2013-1775\",\n \"CVE-2013-1824\",\n \"CVE-2013-1899\",\n \"CVE-2013-1900\",\n \"CVE-2013-1901\",\n \"CVE-2013-1902\",\n \"CVE-2013-1903\",\n \"CVE-2013-2020\",\n \"CVE-2013-2021\",\n \"CVE-2013-2110\",\n \"CVE-2013-2266\"\n );\n script_bugtraq_id(\n 53046,\n 54658,\n 55131,\n 55522,\n 55852,\n 56817,\n 57755,\n 57778,\n 58165,\n 58203,\n 58224,\n 58736,\n 58766,\n 58876,\n 58877,\n 58878,\n 58879,\n 58882,\n 59434,\n 60118,\n 60268,\n 60411,\n 62370,\n 62371,\n 62373,\n 62375,\n 62377\n );\n script_xref(name:\"APPLE-SA\", value:\"APPLE-SA-2013-09-12-1\");\n\n script_name(english:\"Mac OS X Multiple Vulnerabilities (Security Update 2013-004)\");\n script_summary(english:\"Check for the presence of Security Update 2013-004\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\n\"The remote host is missing a Mac OS X update that fixes several\nsecurity issues.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"The remote host is running a version of Mac OS X 10.6 or 10.7 that\ndoes not have Security Update 2013-004 applied. This update contains\nseveral security-related fixes for the following component :\n\n - Apache\n - Bind\n - Certificate Trust Policy\n - ClamAV\n - Installer\n - IPSec\n - Mobile Device Management\n - OpenSSL\n - PHP\n - PostgreSQL\n - QuickTime\n - sudo\n\nNote that successful exploitation of the most serious issues could\nresult in arbitrary code execution.\"\n );\n script_set_attribute(attribute:\"see_also\", value:\"http://support.apple.com/kb/HT5880\");\n script_set_attribute(attribute:\"see_also\", value:\"http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www.securityfocus.com/archive/1/528594/30/0/threaded\");\n script_set_attribute(attribute:\"solution\", value:\"Install Security Update 2013-004 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:F/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'Mac OS X Sudo Password Bypass');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_canvas\", value:\"true\");\n script_set_attribute(attribute:\"canvas_package\", value:'CANVAS');\n script_cwe_id(20, 74, 79, 442, 629, 711, 712, 722, 725, 750, 751, 800, 801, 809, 811, 864, 900, 928, 931, 990);\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2012/04/16\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2013/09/12\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/09/13\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:apple:mac_os_x\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"MacOS X Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2013-2018 Tenable Network Security, Inc.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/MacOSX/Version\", \"Host/MacOSX/packages/boms\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nos = get_kb_item(\"Host/MacOSX/Version\");\nif (!os) audit(AUDIT_OS_NOT, \"Mac OS X\");\nif (!ereg(pattern:\"Mac OS X 10\\.[67]([^0-9]|$)\", string:os)) audit(AUDIT_OS_NOT, \"Mac OS X 10.6 / 10.7\");\nelse if (\"Mac OS X 10.6\" >< os && !ereg(pattern:\"Mac OS X 10\\.6($|\\.[0-8]([^0-9]|$))\", string:os)) exit(0, \"The remote host uses a version of Mac OS X Snow Leopard later than 10.6.8.\");\nelse if (\"Mac OS X 10.7\" >< os && !ereg(pattern:\"Mac OS X 10\\.7($|\\.[0-5]([^0-9]|$))\", string:os)) exit(0, \"The remote host uses a version of Mac OS X Lion later than 10.7.5.\");\n\n\npackages = get_kb_item_or_exit(\"Host/MacOSX/packages/boms\", exit_code:1);\nif (\n egrep(pattern:\"^com\\.apple\\.pkg\\.update\\.security(\\.10\\.[6-8]\\..+)?\\.(2013\\.00[4-9]|201[4-9]\\.[0-9]+)(\\.(snowleopard[0-9.]*|lion))?\\.bom\", string:packages)\n) exit(0, \"The host has Security Update 2013-004 or later installed and is therefore not affected.\");\nelse\n{\n set_kb_item(name:\"www/0/XSS\", value:TRUE);\n\n if (report_verbosity > 0)\n {\n security_boms = egrep(pattern:\"^com\\.apple\\.pkg\\.update\\.security\", string:packages);\n\n report = '\\n Installed security BOMs : ';\n if (security_boms) report += str_replace(find:'\\n', replace:'\\n ', string:security_boms);\n else report += 'n/a';\n report += '\\n';\n\n security_hole(port:0, extra:report);\n }\n else security_hole(0);\n}\n", "cvss": {"score": 10, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2022-06-16T14:15:31", "description": "The remote host is running a version of Mac OS X 10.8.x that is prior to 10.8.5. The newer version contains multiple security-related fixes for the following components :\n\n - Apache\n - Bind\n - Certificate Trust Policy\n - CoreGraphics\n - ImageIO\n - Installer\n - IPSec\n - Kernel\n - Mobile Device Management\n - OpenSSL\n - PHP\n - PostgreSQL\n - Power Management\n - QuickTime\n - Screen Lock\n - sudo\n\nThis update also addresses an issue in which certain Unicode strings could cause applications to unexpectedly quit.\n\nNote that successful exploitation of the most serious issues could result in arbitrary code execution.", "cvss3": {"score": null, "vector": null}, "published": "2013-09-13T00:00:00", "type": "nessus", "title": "Mac OS X 10.8.x < 10.8.5 Multiple Vulnerabilities", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-0883", "CVE-2012-2686", "CVE-2012-2687", "CVE-2012-3499", "CVE-2012-3817", "CVE-2012-4244", "CVE-2012-4558", "CVE-2012-5166", "CVE-2012-5688", "CVE-2013-0166", "CVE-2013-0169", "CVE-2013-1025", "CVE-2013-1026", "CVE-2013-1027", "CVE-2013-1028", "CVE-2013-1029", "CVE-2013-1030", "CVE-2013-1031", "CVE-2013-1032", "CVE-2013-1033", "CVE-2013-1635", "CVE-2013-1643", "CVE-2013-1775", "CVE-2013-1824", "CVE-2013-1899", "CVE-2013-1900", "CVE-2013-1901", "CVE-2013-1902", "CVE-2013-1903", "CVE-2013-2110", "CVE-2013-2266"], "modified": "2018-07-14T00:00:00", "cpe": ["cpe:/o:apple:mac_os_x"], "id": "MACOSX_10_8_5.NASL", "href": "https://www.tenable.com/plugins/nessus/69877", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\n\ninclude(\"compat.inc\");\n\n\nif (description)\n{\n script_id(69877);\n script_version(\"1.18\");\n script_cvs_date(\"Date: 2018/07/14 1:59:36\");\n\n script_cve_id(\n \"CVE-2012-0883\",\n \"CVE-2012-2686\",\n \"CVE-2012-2687\",\n \"CVE-2012-3499\",\n \"CVE-2012-3817\",\n \"CVE-2012-4244\",\n \"CVE-2012-4558\",\n \"CVE-2012-5166\",\n \"CVE-2012-5688\",\n \"CVE-2013-0166\",\n \"CVE-2013-0169\",\n \"CVE-2013-1025\",\n \"CVE-2013-1026\",\n \"CVE-2013-1027\",\n \"CVE-2013-1028\",\n \"CVE-2013-1029\",\n \"CVE-2013-1030\",\n \"CVE-2013-1031\",\n \"CVE-2013-1032\",\n \"CVE-2013-1033\",\n \"CVE-2013-1635\",\n \"CVE-2013-1643\",\n \"CVE-2013-1775\",\n \"CVE-2013-1824\",\n \"CVE-2013-1899\",\n \"CVE-2013-1900\",\n \"CVE-2013-1901\",\n \"CVE-2013-1902\",\n \"CVE-2013-1903\",\n \"CVE-2013-2110\",\n \"CVE-2013-2266\"\n );\n script_bugtraq_id(\n 53046,\n 54658,\n 55131,\n 55522,\n 55852,\n 56817,\n 57755,\n 57778,\n 58165,\n 58203,\n 58224,\n 58736,\n 58766,\n 58876,\n 58877,\n 58878,\n 58879,\n 58882,\n 60268,\n 60411,\n 62368,\n 62369,\n 62370,\n 62371,\n 62373,\n 62374,\n 62375,\n 62377,\n 62378,\n 62381,\n 62382\n );\n script_xref(name:\"APPLE-SA\", value:\"APPLE-SA-2013-09-12-1\");\n\n script_name(english:\"Mac OS X 10.8.x < 10.8.5 Multiple Vulnerabilities\");\n script_summary(english:\"Check the version of Mac OS X\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\n\"The remote host is missing a Mac OS X update that fixes several\nsecurity issues.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"The remote host is running a version of Mac OS X 10.8.x that is prior\nto 10.8.5. The newer version contains multiple security-related fixes\nfor the following components :\n\n - Apache\n - Bind\n - Certificate Trust Policy\n - CoreGraphics\n - ImageIO\n - Installer\n - IPSec\n - Kernel\n - Mobile Device Management\n - OpenSSL\n - PHP\n - PostgreSQL\n - Power Management\n - QuickTime\n - Screen Lock\n - sudo\n\nThis update also addresses an issue in which certain Unicode strings\ncould cause applications to unexpectedly quit.\n\nNote that successful exploitation of the most serious issues could\nresult in arbitrary code execution.\"\n );\n script_set_attribute(attribute:\"see_also\", value:\"http://support.apple.com/kb/HT5880\");\n script_set_attribute(attribute:\"see_also\", value:\"http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www.securityfocus.com/archive/1/528594/30/0/threaded\");\n script_set_attribute(attribute:\"solution\", value:\"Upgrade to Mac OS X 10.8.5 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:F/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'Mac OS X Sudo Password Bypass');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_canvas\", value:\"true\");\n script_set_attribute(attribute:\"canvas_package\", value:'CANVAS');\n script_cwe_id(20, 74, 79, 442, 629, 711, 712, 722, 725, 750, 751, 800, 801, 809, 811, 864, 900, 928, 931, 990);\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2012/04/16\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2013/09/12\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/09/13\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"combined\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:apple:mac_os_x\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"MacOS X Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2013-2018 Tenable Network Security, Inc.\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"os_fingerprint.nasl\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\n\n\nos = get_kb_item(\"Host/MacOSX/Version\");\nif (!os)\n{\n os = get_kb_item_or_exit(\"Host/OS\");\n if (\"Mac OS X\" >!< os) audit(AUDIT_OS_NOT, \"Mac OS X\");\n\n c = get_kb_item(\"Host/OS/Confidence\");\n if (c <= 70) exit(1, \"Can't determine the host's OS with sufficient confidence.\");\n}\nif (!os) audit(AUDIT_OS_NOT, \"Mac OS X\");\n\n\nif (ereg(pattern:\"Mac OS X 10\\.8($|\\.[0-4]([^0-9]|$))\", string:os))\n{\n set_kb_item(name:\"www/0/XSS\", value:TRUE);\n\n security_hole(0);\n}\nelse exit(0, \"The host is not affected as it is running \"+os+\".\");\n", "cvss": {"score": 10, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-08-19T12:52:45", "description": "The remote host is missing Mac OS X security update 2013-004 that fixes multiple security issues. \n\nThe remote host is running a version of Mac OS X 10.8 that is older than 10.8.5. The newer version contains numerous security-related fixes for the following components :\n\n - Apache\n - Bind\n - Certificate Trust Policy\n - CoreGraphics\n - ImageIO\n - Installer\n - IPSec\n - Kernel\n - Mobile Device Management\n - OpenSSL\n - PHP\n - PostgreSQL\n - Power Management\n - QuickTime\n - Screen Lock\n - sudo\n\n This update also addresses an issue in which certain Unicode strings could cause applications to unexpectedly quit.\n\n Note that successful exploitation of the most serious issues could result in arbitrary code execution.", "cvss3": {"score": 9.8, "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2013-09-16T00:00:00", "type": "nessus", "title": "Mac OS X 10.8 < 10.8.5 Multiple Vulnerabilities (Security Update 2013-004)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2013-1775", "CVE-2012-4244", "CVE-2012-5166", "CVE-2013-0169", "CVE-2012-5688", "CVE-2013-0166", "CVE-2012-2687", "CVE-2013-1900", "CVE-2012-3817", "CVE-2012-3499", "CVE-2012-4558", "CVE-2013-2266", "CVE-2013-1643", "CVE-2012-2686", "CVE-2013-1899", "CVE-2013-1901", "CVE-2013-2110", "CVE-2012-0883", "CVE-2013-1635", "CVE-2013-1824", "CVE-2013-1032", "CVE-2013-5163", "CVE-2013-1031", "CVE-2013-1026", "CVE-2013-1027", "CVE-2013-1033", "CVE-2013-1028", "CVE-2013-1025", "CVE-2013-1903", "CVE-2013-1902", "CVE-2013-1030", "CVE-2013-1029"], "modified": "2019-03-06T00:00:00", "cpe": ["cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"], "id": "8008.PRM", "href": "https://www.tenable.com/plugins/nnm/8008", "sourceData": "Binary data 8008.prm", "cvss": {"score": 10, "vector": "CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2022-03-27T15:42:17", "description": "The remote OracleVM system is missing necessary patches to address critical security updates :\n\n - Fix CVE-2017-3136 (ISC change 4575)\n\n - Fix CVE-2017-3137 (ISC change 4578)\n\n - Fix and test caching CNAME before DNAME (ISC change 4558)\n\n - Fix CVE-2016-9147 (ISC change 4510)\n\n - Fix regression introduced by CVE-2016-8864 (ISC change 4530)\n\n - Restore SELinux contexts before named restart\n\n - Use /lib or /lib64 only if directory in chroot already exists\n\n - Tighten NSS library pattern, escape chroot mount path\n\n - Fix (CVE-2016-8864)\n\n - Do not change lib permissions in chroot (#1321239)\n\n - Support WKS records in chroot (#1297562)\n\n - Do not include patch backup in docs (fixes #1325081 patch)\n\n - Backported relevant parts of [RT #39567] (#1259923)\n\n - Increase ISC_SOCKET_MAXEVENTS to 2048 (#1326283)\n\n - Fix multiple realms in nsupdate script like upstream (#1313286)\n\n - Fix multiple realm in nsupdate script (#1313286)\n\n - Use resolver-query-timeout high enough to recover all forwarders (#1325081)\n\n - Fix (CVE-2016-2848)\n\n - Fix infinite loop in start_lookup (#1306504)\n\n - Fix (CVE-2016-2776)", "cvss3": {"score": 8.6, "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H"}, "published": "2017-04-21T00:00:00", "type": "nessus", "title": "OracleVM 3.3 / 3.4 : bind (OVMSA-2017-0066)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2006-4095", "CVE-2007-2241", "CVE-2007-2925", "CVE-2007-2926", "CVE-2007-6283", "CVE-2008-0122", "CVE-2008-1447", "CVE-2009-0025", "CVE-2009-0696", "CVE-2010-0097", "CVE-2010-0290", "CVE-2011-0414", "CVE-2011-1910", "CVE-2011-2464", "CVE-2012-1033", "CVE-2012-1667", "CVE-2012-3817", "CVE-2012-4244", "CVE-2012-5166", "CVE-2012-5688", "CVE-2012-5689", "CVE-2013-2266", "CVE-2013-4854", "CVE-2014-0591", "CVE-2014-8500", "CVE-2015-1349", "CVE-2015-4620", "CVE-2015-5477", "CVE-2015-5722", "CVE-2015-8000", "CVE-2015-8704", "CVE-2016-1285", "CVE-2016-1286", "CVE-2016-2776", "CVE-2016-2848", "CVE-2016-8864", "CVE-2016-9147", "CVE-2017-3136", "CVE-2017-3137"], "modified": "2021-01-04T00:00:00", "cpe": ["p-cpe:/a:oracle:vm:bind-libs", "p-cpe:/a:oracle:vm:bind-utils", "cpe:/o:oracle:vm_server:3.3", "cpe:/o:oracle:vm_server:3.4"], "id": "ORACLEVM_OVMSA-2017-0066.NASL", "href": "https://www.tenable.com/plugins/nessus/99569", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The package checks in this plugin were extracted from OracleVM\n# Security Advisory OVMSA-2017-0066.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(99569);\n script_version(\"3.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2006-4095\", \"CVE-2007-2241\", \"CVE-2007-2925\", \"CVE-2007-2926\", \"CVE-2007-6283\", \"CVE-2008-0122\", \"CVE-2008-1447\", \"CVE-2009-0025\", \"CVE-2009-0696\", \"CVE-2010-0097\", \"CVE-2010-0290\", \"CVE-2011-0414\", \"CVE-2011-1910\", \"CVE-2011-2464\", \"CVE-2012-1033\", \"CVE-2012-1667\", \"CVE-2012-3817\", \"CVE-2012-4244\", \"CVE-2012-5166\", \"CVE-2012-5688\", \"CVE-2012-5689\", \"CVE-2013-2266\", \"CVE-2013-4854\", \"CVE-2014-0591\", \"CVE-2014-8500\", \"CVE-2015-1349\", \"CVE-2015-4620\", \"CVE-2015-5477\", \"CVE-2015-5722\", \"CVE-2015-8000\", \"CVE-2015-8704\", \"CVE-2016-1285\", \"CVE-2016-1286\", \"CVE-2016-2776\", \"CVE-2016-2848\", \"CVE-2016-8864\", \"CVE-2016-9147\", \"CVE-2017-3136\", \"CVE-2017-3137\");\n script_bugtraq_id(19859, 25037, 27283, 30131, 33151, 35848, 37118, 37865, 46491, 48007, 48566, 51898, 53772, 54658, 55522, 55852, 56817, 57556, 58736, 61479, 64801, 71590, 72673, 75588);\n script_xref(name:\"IAVA\", value:\"2008-A-0045\");\n script_xref(name:\"IAVA\", value:\"2017-A-0004\");\n\n script_name(english:\"OracleVM 3.3 / 3.4 : bind (OVMSA-2017-0066)\");\n script_summary(english:\"Checks the RPM output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote OracleVM host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The remote OracleVM system is missing necessary patches to address\ncritical security updates :\n\n - Fix CVE-2017-3136 (ISC change 4575)\n\n - Fix CVE-2017-3137 (ISC change 4578)\n\n - Fix and test caching CNAME before DNAME (ISC change\n 4558)\n\n - Fix CVE-2016-9147 (ISC change 4510)\n\n - Fix regression introduced by CVE-2016-8864 (ISC change\n 4530)\n\n - Restore SELinux contexts before named restart\n\n - Use /lib or /lib64 only if directory in chroot already\n exists\n\n - Tighten NSS library pattern, escape chroot mount path\n\n - Fix (CVE-2016-8864)\n\n - Do not change lib permissions in chroot (#1321239)\n\n - Support WKS records in chroot (#1297562)\n\n - Do not include patch backup in docs (fixes #1325081\n patch)\n\n - Backported relevant parts of [RT #39567] (#1259923)\n\n - Increase ISC_SOCKET_MAXEVENTS to 2048 (#1326283)\n\n - Fix multiple realms in nsupdate script like upstream\n (#1313286)\n\n - Fix multiple realm in nsupdate script (#1313286)\n\n - Use resolver-query-timeout high enough to recover all\n forwarders (#1325081)\n\n - Fix (CVE-2016-2848)\n\n - Fix infinite loop in start_lookup (#1306504)\n\n - Fix (CVE-2016-2776)\"\n );\n # https://oss.oracle.com/pipermail/oraclevm-errata/2017-April/000681.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?cd826bc7\"\n );\n # https://oss.oracle.com/pipermail/oraclevm-errata/2017-April/000680.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?67f77036\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected bind-libs / bind-utils packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:F/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:F/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_cwe_id(16, 189, 200, 287);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:vm:bind-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:vm:bind-utils\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:vm_server:3.3\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:vm_server:3.4\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2006/09/05\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/04/20\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/04/21\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2017-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"OracleVM Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/OracleVM/release\", \"Host/OracleVM/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/OracleVM/release\");\nif (isnull(release) || \"OVS\" >!< release) audit(AUDIT_OS_NOT, \"OracleVM\");\nif (! preg(pattern:\"^OVS\" + \"(3\\.3|3\\.4)\" + \"(\\.[0-9]|$)\", string:release)) audit(AUDIT_OS_NOT, \"OracleVM 3.3 / 3.4\", \"OracleVM \" + release);\nif (!get_kb_item(\"Host/OracleVM/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"OracleVM\", cpu);\nif (\"x86_64\" >!< cpu) audit(AUDIT_ARCH_NOT, \"x86_64\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"OVS3.3\", reference:\"bind-libs-9.8.2-0.62.rc1.el6_9.1\")) flag++;\nif (rpm_check(release:\"OVS3.3\", reference:\"bind-utils-9.8.2-0.62.rc1.el6_9.1\")) flag++;\n\nif (rpm_check(release:\"OVS3.4\", reference:\"bind-libs-9.8.2-0.62.rc1.el6_9.1\")) flag++;\nif (rpm_check(release:\"OVS3.4\", reference:\"bind-utils-9.8.2-0.62.rc1.el6_9.1\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"bind-libs / bind-utils\");\n}\n", "cvss": {"score": 10, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2022-05-17T14:18:37", "description": "The remote OracleVM system is missing necessary patches to address critical security updates : please see Oracle VM Security Advisory OVMSA-2020-0021 for details.", "cvss3": {"score": 6.8, "vector": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N"}, "published": "2020-06-05T00:00:00", "type": "nessus", "title": "OracleVM 3.3 / 3.4 : bind (OVMSA-2020-0021)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2006-4095", "CVE-2007-2241", "CVE-2007-2925", "CVE-2007-2926", "CVE-2007-6283", "CVE-2008-0122", "CVE-2008-1447", "CVE-2009-0025", "CVE-2009-0696", "CVE-2010-0097", "CVE-2010-0290", "CVE-2011-0414", "CVE-2011-1910", "CVE-2011-2464", "CVE-2012-1033", "CVE-2012-1667", "CVE-2012-3817", "CVE-2012-4244", "CVE-2012-5166", "CVE-2012-5688", "CVE-2012-5689", "CVE-2013-2266", "CVE-2013-4854", "CVE-2014-0591", "CVE-2014-8500", "CVE-2015-1349", "CVE-2015-4620", "CVE-2015-5477", "CVE-2015-5722", "CVE-2015-8000", "CVE-2015-8704", "CVE-2016-1285", "CVE-2016-1286", "CVE-2016-2776", "CVE-2016-2848", "CVE-2016-8864", "CVE-2016-9147", "CVE-2017-3136", "CVE-2017-3137", "CVE-2017-3142", "CVE-2017-3143", "CVE-2017-3145", "CVE-2018-5740", "CVE-2018-5743", "CVE-2020-8616", "CVE-2020-8617"], "modified": "2022-05-16T00:00:00", "cpe": ["p-cpe:/a:oracle:vm:bind-libs", "p-cpe:/a:oracle:vm:bind-utils", "cpe:/o:oracle:vm_server:3.3", "cpe:/o:oracle:vm_server:3.4"], "id": "ORACLEVM_OVMSA-2020-0021.NASL", "href": "https://www.tenable.com/plugins/nessus/137170", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The package checks in this plugin were extracted from OracleVM\n# Security Advisory OVMSA-2020-0021.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(137170);\n script_version(\"1.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/05/16\");\n\n script_cve_id(\"CVE-2006-4095\", \"CVE-2007-2241\", \"CVE-2007-2925\", \"CVE-2007-2926\", \"CVE-2007-6283\", \"CVE-2008-0122\", \"CVE-2008-1447\", \"CVE-2009-0025\", \"CVE-2009-0696\", \"CVE-2010-0097\", \"CVE-2010-0290\", \"CVE-2011-0414\", \"CVE-2011-1910\", \"CVE-2011-2464\", \"CVE-2012-1033\", \"CVE-2012-1667\", \"CVE-2012-3817\", \"CVE-2012-4244\", \"CVE-2012-5166\", \"CVE-2012-5688\", \"CVE-2012-5689\", \"CVE-2013-2266\", \"CVE-2013-4854\", \"CVE-2014-0591\", \"CVE-2014-8500\", \"CVE-2015-1349\", \"CVE-2015-4620\", \"CVE-2015-5477\", \"CVE-2015-5722\", \"CVE-2015-8000\", \"CVE-2015-8704\", \"CVE-2016-1285\", \"CVE-2016-1286\", \"CVE-2016-2776\", \"CVE-2016-2848\", \"CVE-2016-8864\", \"CVE-2016-9147\", \"CVE-2017-3136\", \"CVE-2017-3137\", \"CVE-2017-3142\", \"CVE-2017-3143\", \"CVE-2017-3145\", \"CVE-2018-5740\", \"CVE-2018-5743\", \"CVE-2020-8616\", \"CVE-2020-8617\");\n script_bugtraq_id(19859, 25037, 27283, 30131, 33151, 35848, 37118, 37865, 46491, 48007, 48566, 51898, 53772, 54658, 55522, 55852, 56817, 57556, 58736, 61479, 64801, 71590, 72673, 75588);\n\n script_name(english:\"OracleVM 3.3 / 3.4 : bind (OVMSA-2020-0021)\");\n script_summary(english:\"Checks the RPM output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote OracleVM host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"The remote OracleVM system is missing necessary patches to address\ncritical security updates : please see Oracle VM Security Advisory\nOVMSA-2020-0021 for details.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://oss.oracle.com/pipermail/oraclevm-errata/2020-June/000984.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://oss.oracle.com/pipermail/oraclevm-errata/2020-June/000981.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://oss.oracle.com/pipermail/oraclevm-errata/2020-June/000982.html\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\"Update the affected bind-libs / bind-utils packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:F/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:F/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2008-0122\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_cwe_id(16, 189, 200, 287);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:vm:bind-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:vm:bind-utils\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:vm_server:3.3\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:vm_server:3.4\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2006/09/06\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/06/05\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/06/05\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2020-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"OracleVM Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/OracleVM/release\", \"Host/OracleVM/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/OracleVM/release\");\nif (isnull(release) || \"OVS\" >!< release) audit(AUDIT_OS_NOT, \"OracleVM\");\nif (! preg(pattern:\"^OVS\" + \"(3\\.3|3\\.4)\" + \"(\\.[0-9]|$)\", string:release)) audit(AUDIT_OS_NOT, \"OracleVM 3.3 / 3.4\", \"OracleVM \" + release);\nif (!get_kb_item(\"Host/OracleVM/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"OracleVM\", cpu);\nif (\"x86_64\" >!< cpu) audit(AUDIT_ARCH_NOT, \"x86_64\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"OVS3.3\", reference:\"bind-libs-9.8.2-0.68.rc1.el6_10.7\")) flag++;\nif (rpm_check(release:\"OVS3.3\", reference:\"bind-utils-9.8.2-0.68.rc1.el6_10.7\")) flag++;\n\nif (rpm_check(release:\"OVS3.4\", reference:\"bind-libs-9.8.2-0.68.rc1.el6_10.7\")) flag++;\nif (rpm_check(release:\"OVS3.4\", reference:\"bind-utils-9.8.2-0.68.rc1.el6_10.7\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"bind-libs / bind-utils\");\n}\n", "cvss": {"score": 10, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "openvas": [{"lastseen": "2019-05-29T18:38:35", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2012-12-10T00:00:00", "type": "openvas", "title": "CentOS Update for bind CESA-2012:1549 centos6", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-5688"], "modified": "2019-03-15T00:00:00", "id": "OPENVAS:1361412562310881548", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310881548", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# CentOS Update for bind CESA-2012:1549 centos6\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"http://lists.centos.org/pipermail/centos-announce/2012-December/019025.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.881548\");\n script_version(\"$Revision: 14222 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 13:50:48 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2012-12-10 09:48:43 +0530 (Mon, 10 Dec 2012)\");\n script_cve_id(\"CVE-2012-5688\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_xref(name:\"CESA\", value:\"2012:1549\");\n script_name(\"CentOS Update for bind CESA-2012:1549 centos6\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'bind'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\", re:\"ssh/login/release=CentOS6\");\n script_tag(name:\"affected\", value:\"bind on CentOS 6\");\n script_tag(name:\"solution\", value:\"Please install the updated packages.\");\n script_tag(name:\"insight\", value:\"The Berkeley Internet Name Domain (BIND) is an implementation of the Domain\n Name System (DNS) protocols. BIND includes a DNS server (named), a resolver\n library (routines for applications to use when interfacing with DNS), and\n tools for verifying that the DNS server is operating correctly. DNS64 is\n used to automatically generate DNS records so IPv6 based clients can access\n IPv4 systems through a NAT64 server.\n\n A flaw was found in the DNS64 implementation in BIND. If a remote attacker\n sent a specially-crafted query to a named server, named could exit\n unexpectedly with an assertion failure. Note that DNS64 support is not\n enabled by default. (CVE-2012-5688)\n\n Users of bind are advised to upgrade to these updated packages, which\n correct this issue. After installing the update, the BIND daemon (named)\n will be restarted automatically.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"CentOS6\")\n{\n\n if ((res = isrpmvuln(pkg:\"bind\", rpm:\"bind~9.8.2~0.10.rc1.el6_3.6\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"bind-chroot\", rpm:\"bind-chroot~9.8.2~0.10.rc1.el6_3.6\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"bind-devel\", rpm:\"bind-devel~9.8.2~0.10.rc1.el6_3.6\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"bind-libs\", rpm:\"bind-libs~9.8.2~0.10.rc1.el6_3.6\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"bind-sdb\", rpm:\"bind-sdb~9.8.2~0.10.rc1.el6_3.6\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"bind-utils\", rpm:\"bind-utils~9.8.2~0.10.rc1.el6_3.6\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2017-12-04T11:20:38", "description": "Ubuntu Update for Linux kernel vulnerabilities USN-1657-1", "cvss3": {}, "published": "2012-12-10T00:00:00", "type": "openvas", "title": "Ubuntu Update for bind9 USN-1657-1", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-5688"], "modified": "2017-12-01T00:00:00", "id": "OPENVAS:841245", "href": "http://plugins.openvas.org/nasl.php?oid=841245", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_ubuntu_USN_1657_1.nasl 7960 2017-12-01 06:58:16Z santu $\n#\n# Ubuntu Update for bind9 USN-1657-1\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"It was discovered that Bind incorrectly handled certain crafted queries\n when DNS64 was enabled. A remote attacker could use this flaw to cause Bind\n to crash, resulting in a denial of service.\";\n\ntag_summary = \"Ubuntu Update for Linux kernel vulnerabilities USN-1657-1\";\ntag_affected = \"bind9 on Ubuntu 12.10 ,\n Ubuntu 12.04 LTS\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name: \"URL\" , value: \"http://www.ubuntu.com/usn/usn-1657-1/\");\n script_id(841245);\n script_version(\"$Revision: 7960 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-01 07:58:16 +0100 (Fri, 01 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2012-12-10 09:49:40 +0530 (Mon, 10 Dec 2012)\");\n script_cve_id(\"CVE-2012-5688\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_xref(name: \"USN\", value: \"1657-1\");\n script_name(\"Ubuntu Update for bind9 USN-1657-1\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\");\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"UBUNTU12.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"bind9\", ver:\"1:9.8.1.dfsg.P1-4ubuntu0.5\", rls:\"UBUNTU12.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"UBUNTU12.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"bind9\", ver:\"1:9.8.1.dfsg.P1-4.2ubuntu3.1\", rls:\"UBUNTU12.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2018-01-11T11:07:39", "description": "Check for the Version of bind", "cvss3": {}, "published": "2012-12-10T00:00:00", "type": "openvas", "title": "CentOS Update for bind CESA-2012:1549 centos6 ", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-5688"], "modified": "2018-01-09T00:00:00", "id": "OPENVAS:881548", "href": "http://plugins.openvas.org/nasl.php?oid=881548", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# CentOS Update for bind CESA-2012:1549 centos6 \n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"The Berkeley Internet Name Domain (BIND) is an implementation of the Domain\n Name System (DNS) protocols. BIND includes a DNS server (named); a resolver\n library (routines for applications to use when interfacing with DNS); and\n tools for verifying that the DNS server is operating correctly. DNS64 is\n used to automatically generate DNS records so IPv6 based clients can access\n IPv4 systems through a NAT64 server.\n\n A flaw was found in the DNS64 implementation in BIND. If a remote attacker\n sent a specially-crafted query to a named server, named could exit\n unexpectedly with an assertion failure. Note that DNS64 support is not\n enabled by default. (CVE-2012-5688)\n \n Users of bind are advised to upgrade to these updated packages, which\n correct this issue. After installing the update, the BIND daemon (named)\n will be restarted automatically.\";\n\ntag_affected = \"bind on CentOS 6\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.centos.org/pipermail/centos-announce/2012-December/019025.html\");\n script_id(881548);\n script_version(\"$Revision: 8336 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-01-09 08:01:48 +0100 (Tue, 09 Jan 2018) $\");\n script_tag(name:\"creation_date\", value:\"2012-12-10 09:48:43 +0530 (Mon, 10 Dec 2012)\");\n script_cve_id(\"CVE-2012-5688\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_xref(name: \"CESA\", value: \"2012:1549\");\n script_name(\"CentOS Update for bind CESA-2012:1549 centos6 \");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of bind\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"CentOS6\")\n{\n\n if ((res = isrpmvuln(pkg:\"bind\", rpm:\"bind~9.8.2~0.10.rc1.el6_3.6\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"bind-chroot\", rpm:\"bind-chroot~9.8.2~0.10.rc1.el6_3.6\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"bind-devel\", rpm:\"bind-devel~9.8.2~0.10.rc1.el6_3.6\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"bind-libs\", rpm:\"bind-libs~9.8.2~0.10.rc1.el6_3.6\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"bind-sdb\", rpm:\"bind-sdb~9.8.2~0.10.rc1.el6_3.6\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"bind-utils\", rpm:\"bind-utils~9.8.2~0.10.rc1.el6_3.6\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2018-01-11T11:06:09", "description": "Check for the Version of bind", "cvss3": {}, "published": "2012-12-06T00:00:00", "type": "openvas", "title": "Mandriva Update for bind MDVSA-2012:177 (bind)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-5688"], "modified": "2018-01-09T00:00:00", "id": "OPENVAS:831754", "href": "http://plugins.openvas.org/nasl.php?oid=831754", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Mandriva Update for bind MDVSA-2012:177 (bind)\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"A vulnerability was discovered and corrected in bind:\n\n BIND 9 nameservers using the DNS64 IPv6 transition mechanism are\n vulnerable to a software defect that allows a crafted query to crash\n the server with a REQUIRE assertion failure. Remote exploitation\n of this defect can be achieved without extensive effort, resulting\n in a denial-of-service (DoS) vector against affected servers\n (CVE-2012-5688).\n\n The updated packages have been upgraded to bind 9.8.4-P1 which is\n not vulnerable to this issue.\";\n\ntag_affected = \"bind on Mandriva Linux 2011.0\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://www.mandriva.com/en/support/security/advisories/?name=MDVSA-2012:177\");\n script_id(831754);\n script_version(\"$Revision: 8336 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-01-09 08:01:48 +0100 (Tue, 09 Jan 2018) $\");\n script_tag(name:\"creation_date\", value:\"2012-12-06 10:26:55 +0530 (Thu, 06 Dec 2012)\");\n script_cve_id(\"CVE-2012-5688\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_xref(name: \"MDVSA\", value: \"2012:177\");\n script_name(\"Mandriva Update for bind MDVSA-2012:177 (bind)\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of bind\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"Mandrake Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/mandriva_mandrake_linux\", \"ssh/login/release\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"MNDK_2011.0\")\n{\n\n if ((res = isrpmvuln(pkg:\"bind\", rpm:\"bind~9.8.4~0.0.P1.0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"bind-devel\", rpm:\"bind-devel~9.8.4~0.0.P1.0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"bind-doc\", rpm:\"bind-doc~9.8.4~0.0.P1.0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"bind-utils\", rpm:\"bind-utils~9.8.4~0.0.P1.0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2019-05-29T18:39:11", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2012-12-10T00:00:00", "type": "openvas", "title": "RedHat Update for bind RHSA-2012:1549-01", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-5688"], "modified": "2019-03-12T00:00:00", "id": "OPENVAS:1361412562310870869", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310870869", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# RedHat Update for bind RHSA-2012:1549-01\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"https://www.redhat.com/archives/rhsa-announce/2012-December/msg00014.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.870869\");\n script_version(\"$Revision: 14114 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-12 12:48:52 +0100 (Tue, 12 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2012-12-10 09:46:42 +0530 (Mon, 10 Dec 2012)\");\n script_cve_id(\"CVE-2012-5688\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_xref(name:\"RHSA\", value:\"2012:1549-01\");\n script_name(\"RedHat Update for bind RHSA-2012:1549-01\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'bind'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"Red Hat Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/rhel\", \"ssh/login/rpms\", re:\"ssh/login/release=RHENT_6\");\n script_tag(name:\"affected\", value:\"bind on Red Hat Enterprise Linux Desktop (v. 6),\n Red Hat Enterprise Linux Server (v. 6),\n Red Hat Enterprise Linux Workstation (v. 6)\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n script_tag(name:\"insight\", value:\"The Berkeley Internet Name Domain (BIND) is an implementation of the Domain\n Name System (DNS) protocols. BIND includes a DNS server (named), a resolver\n library (routines for applications to use when interfacing with DNS), and\n tools for verifying that the DNS server is operating correctly. DNS64 is\n used to automatically generate DNS records so IPv6 based clients can access\n IPv4 systems through a NAT64 server.\n\n A flaw was found in the DNS64 implementation in BIND. If a remote attacker\n sent a specially-crafted query to a named server, named could exit\n unexpectedly with an assertion failure. Note that DNS64 support is not\n enabled by default. (CVE-2012-5688)\n\n Users of bind are advised to upgrade to these updated packages, which\n correct this issue. After installing the update, the BIND daemon (named)\n will be restarted automatically.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"RHENT_6\")\n{\n\n if ((res = isrpmvuln(pkg:\"bind\", rpm:\"bind~9.8.2~0.10.rc1.el6_3.6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"bind-chroot\", rpm:\"bind-chroot~9.8.2~0.10.rc1.el6_3.6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"bind-debuginfo\", rpm:\"bind-debuginfo~9.8.2~0.10.rc1.el6_3.6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"bind-libs\", rpm:\"bind-libs~9.8.2~0.10.rc1.el6_3.6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"bind-utils\", rpm:\"bind-utils~9.8.2~0.10.rc1.el6_3.6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2018-01-02T10:56:31", "description": "Check for the Version of bind", "cvss3": {}, "published": "2012-12-10T00:00:00", "type": "openvas", "title": "RedHat Update for bind RHSA-2012:1549-01", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-5688"], "modified": "2017-12-29T00:00:00", "id": "OPENVAS:870869", "href": "http://plugins.openvas.org/nasl.php?oid=870869", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# RedHat Update for bind RHSA-2012:1549-01\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"The Berkeley Internet Name Domain (BIND) is an implementation of the Domain\n Name System (DNS) protocols. BIND includes a DNS server (named); a resolver\n library (routines for applications to use when interfacing with DNS); and\n tools for verifying that the DNS server is operating correctly. DNS64 is\n used to automatically generate DNS records so IPv6 based clients can access\n IPv4 systems through a NAT64 server.\n\n A flaw was found in the DNS64 implementation in BIND. If a remote attacker\n sent a specially-crafted query to a named server, named could exit\n unexpectedly with an assertion failure. Note that DNS64 support is not\n enabled by default. (CVE-2012-5688)\n\n Users of bind are advised to upgrade to these updated packages, which\n correct this issue. After installing the update, the BIND daemon (named)\n will be restarted automatically.\";\n\ntag_affected = \"bind on Red Hat Enterprise Linux Desktop (v. 6),\n Red Hat Enterprise Linux Server (v. 6),\n Red Hat Enterprise Linux Workstation (v. 6)\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"https://www.redhat.com/archives/rhsa-announce/2012-December/msg00014.html\");\n script_id(870869);\n script_version(\"$Revision: 8257 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-29 07:29:46 +0100 (Fri, 29 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2012-12-10 09:46:42 +0530 (Mon, 10 Dec 2012)\");\n script_cve_id(\"CVE-2012-5688\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_xref(name: \"RHSA\", value: \"2012:1549-01\");\n script_name(\"RedHat Update for bind RHSA-2012:1549-01\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of bind\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"Red Hat Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/rhel\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"RHENT_6\")\n{\n\n if ((res = isrpmvuln(pkg:\"bind\", rpm:\"bind~9.8.2~0.10.rc1.el6_3.6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"bind-chroot\", rpm:\"bind-chroot~9.8.2~0.10.rc1.el6_3.6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"bind-debuginfo\", rpm:\"bind-debuginfo~9.8.2~0.10.rc1.el6_3.6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"bind-libs\", rpm:\"bind-libs~9.8.2~0.10.rc1.el6_3.6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"bind-utils\", rpm:\"bind-utils~9.8.2~0.10.rc1.el6_3.6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2019-12-11T19:36:00", "description": "The host is installed with ISC BIND and is\n prone to remote denial of service vulnerability.", "cvss3": {}, "published": "2016-01-28T00:00:00", "type": "openvas", "title": "ISC BIND DNS64 Remote Denial of Service Vulnerability - Jan16", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-5688"], "modified": "2019-12-10T00:00:00", "id": "OPENVAS:1361412562310807204", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310807204", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# ISC BIND DNS64 Remote Denial of Service Vulnerability - Jan16\n#\n# Authors:\n# Tushar Khelge <ktushar@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2016 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:isc:bind\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.807204\");\n script_version(\"2019-12-10T15:03:15+0000\");\n script_cve_id(\"CVE-2012-5688\");\n script_bugtraq_id(56817);\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_tag(name:\"last_modification\", value:\"2019-12-10 15:03:15 +0000 (Tue, 10 Dec 2019)\");\n script_tag(name:\"creation_date\", value:\"2016-01-28 12:39:11 +0530 (Thu, 28 Jan 2016)\");\n script_tag(name:\"qod_type\", value:\"remote_banner_unreliable\");\n script_name(\"ISC BIND DNS64 Remote Denial of Service Vulnerability - Jan16\");\n\n script_tag(name:\"summary\", value:\"The host is installed with ISC BIND and is\n prone to remote denial of service vulnerability.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"The flaw exists due to some unspecified\n error in ISC BIND when DNS64 is enabled.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow remote\n attackers to cause denial of service.\");\n\n script_tag(name:\"affected\", value:\"ISC BIND versions 9.8.x before 9.8.4-P1\n and 9.9.x before 9.9.2-P1.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to ISC BIND version 9.8.4-P1 or\n 9.9.2-P1 or later.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_xref(name:\"URL\", value:\"https://kb.isc.org/docs/aa-00828\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2016 Greenbone Networks GmbH\");\n script_family(\"Denial of Service\");\n script_dependencies(\"bind_version.nasl\");\n script_mandatory_keys(\"isc/bind/detected\");\n exit(0);\n}\n\ninclude(\"version_func.inc\");\ninclude(\"host_details.inc\");\n\nif( ! port = get_app_port( cpe:CPE ) ) exit( 0 );\nif( ! infos = get_app_version_and_proto( cpe:CPE, port:port ) ) exit( 0 );\n\nversion = infos[\"version\"];\nproto = infos[\"proto\"];\n\nif(version_in_range(version:version, test_version:\"9.8.0\", test_version2:\"9.8.4\"))\n{\n fix = \"9.8.4-P1\";\n VULN = TRUE;\n}\n\nelse if(version_in_range(version:version, test_version:\"9.9.0\", test_version2:\"9.9.2\"))\n{\n fix =\"9.9.2-P1\";\n VULN = TRUE;\n}\n\nif(VULN)\n{\n report = report_fixed_ver(installed_version:version, fixed_version:fix);\n security_message( data:report, port:port, proto:proto );\n exit( 0 );\n}\n\nexit( 99 );\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2019-05-29T18:36:15", "description": "Oracle Linux Local Security Checks ELSA-2012-1549", "cvss3": {}, "published": "2015-10-06T00:00:00", "type": "openvas", "title": "Oracle Linux Local Check: ELSA-2012-1549", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-5688"], "modified": "2018-09-28T00:00:00", "id": "OPENVAS:1361412562310123772", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310123772", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: ELSA-2012-1549.nasl 11688 2018-09-28 13:36:28Z cfischer $\n#\n# Oracle Linux Local Check\n#\n# Authors:\n# Eero Volotinen <eero.volotinen@solinor.com>\n#\n# Copyright:\n# Copyright (c) 2015 Eero Volotinen, http://solinor.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.123772\");\n script_version(\"$Revision: 11688 $\");\n script_tag(name:\"creation_date\", value:\"2015-10-06 14:08:20 +0300 (Tue, 06 Oct 2015)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-09-28 15:36:28 +0200 (Fri, 28 Sep 2018) $\");\n script_name(\"Oracle Linux Local Check: ELSA-2012-1549\");\n script_tag(name:\"insight\", value:\"ELSA-2012-1549 - bind security update. Please see the references for more insight.\");\n script_tag(name:\"solution\", value:\"Update the affected packages to the latest available version.\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"summary\", value:\"Oracle Linux Local Security Checks ELSA-2012-1549\");\n script_xref(name:\"URL\", value:\"http://linux.oracle.com/errata/ELSA-2012-1549.html\");\n script_cve_id(\"CVE-2012-5688\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/oracle_linux\", \"ssh/login/release\", re:\"ssh/login/release=OracleLinux6\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Eero Volotinen\");\n script_family(\"Oracle Linux Local Security Checks\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"OracleLinux6\")\n{\n if ((res = isrpmvuln(pkg:\"bind\", rpm:\"bind~9.8.2~0.10.rc1.el6_3.6\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"bind-chroot\", rpm:\"bind-chroot~9.8.2~0.10.rc1.el6_3.6\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"bind-devel\", rpm:\"bind-devel~9.8.2~0.10.rc1.el6_3.6\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"bind-libs\", rpm:\"bind-libs~9.8.2~0.10.rc1.el6_3.6\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"bind-sdb\", rpm:\"bind-sdb~9.8.2~0.10.rc1.el6_3.6\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"bind-utils\", rpm:\"bind-utils~9.8.2~0.10.rc1.el6_3.6\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n\n}\nif (__pkg_match) exit(99);\n exit(0);\n\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2019-05-29T18:38:49", "description": "Ubuntu Update for Linux kernel vulnerabilities USN-1657-1", "cvss3": {}, "published": "2012-12-10T00:00:00", "type": "openvas", "title": "Ubuntu Update for bind9 USN-1657-1", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-5688"], "modified": "2019-03-13T00:00:00", "id": "OPENVAS:1361412562310841245", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310841245", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_ubuntu_USN_1657_1.nasl 14132 2019-03-13 09:25:59Z cfischer $\n#\n# Ubuntu Update for bind9 USN-1657-1\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"http://www.ubuntu.com/usn/usn-1657-1/\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.841245\");\n script_version(\"$Revision: 14132 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-13 10:25:59 +0100 (Wed, 13 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2012-12-10 09:49:40 +0530 (Mon, 10 Dec 2012)\");\n script_cve_id(\"CVE-2012-5688\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_xref(name:\"USN\", value:\"1657-1\");\n script_name(\"Ubuntu Update for bind9 USN-1657-1\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=UBUNTU(12\\.04 LTS|12\\.10)\");\n script_tag(name:\"summary\", value:\"Ubuntu Update for Linux kernel vulnerabilities USN-1657-1\");\n script_tag(name:\"affected\", value:\"bind9 on Ubuntu 12.10,\n Ubuntu 12.04 LTS\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n script_tag(name:\"insight\", value:\"It was discovered that Bind incorrectly handled certain crafted queries\n when DNS64 was enabled. A remote attacker could use this flaw to cause Bind\n to crash, resulting in a denial of service.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"UBUNTU12.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"bind9\", ver:\"1:9.8.1.dfsg.P1-4ubuntu0.5\", rls:\"UBUNTU12.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"UBUNTU12.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"bind9\", ver:\"1:9.8.1.dfsg.P1-4.2ubuntu3.1\", rls:\"UBUNTU12.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2019-05-29T18:38:35", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2012-12-06T00:00:00", "type": "openvas", "title": "Mandriva Update for bind MDVSA-2012:177 (bind)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-5688"], "modified": "2018-11-16T00:00:00", "id": "OPENVAS:1361412562310831754", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310831754", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Mandriva Update for bind MDVSA-2012:177 (bind)\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"http://www.mandriva.com/en/support/security/advisories/?name=MDVSA-2012:177\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.831754\");\n script_version(\"$Revision: 12381 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-11-16 12:16:30 +0100 (Fri, 16 Nov 2018) $\");\n script_tag(name:\"creation_date\", value:\"2012-12-06 10:26:55 +0530 (Thu, 06 Dec 2012)\");\n script_cve_id(\"CVE-2012-5688\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_xref(name:\"MDVSA\", value:\"2012:177\");\n script_name(\"Mandriva Update for bind MDVSA-2012:177 (bind)\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'bind'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"Mandrake Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/mandriva_mandrake_linux\", \"ssh/login/release\", re:\"ssh/login/release=MNDK_2011\\.0\");\n script_tag(name:\"affected\", value:\"bind on Mandriva Linux 2011.0\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n script_tag(name:\"insight\", value:\"A vulnerability was discovered and corrected in bind:\n\n BIND 9 nameservers using the DNS64 IPv6 transition mechanism are\n vulnerable to a software defect that allows a crafted query to crash\n the server with a REQUIRE assertion failure. Remote exploitation\n of this defect can be achieved without extensive effort, resulting\n in a denial-of-service (DoS) vector against affected servers\n (CVE-2012-5688).\n\n The updated packages have been upgraded to bind 9.8.4-P1 which is\n not vulnerable to this issue.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"MNDK_2011.0\")\n{\n\n if ((res = isrpmvuln(pkg:\"bind\", rpm:\"bind~9.8.4~0.0.P1.0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"bind-devel\", rpm:\"bind-devel~9.8.4~0.0.P1.0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"bind-doc\", rpm:\"bind-doc~9.8.4~0.0.P1.0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"bind-utils\", rpm:\"bind-utils~9.8.4~0.0.P1.0.1\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2020-03-17T23:03:30", "description": "The remote host is missing an update announced via the referenced Security Advisory.", "cvss3": {}, "published": "2015-09-08T00:00:00", "type": "openvas", "title": "Amazon Linux: Security Advisory (ALAS-2012-146)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-5688"], "modified": "2020-03-13T00:00:00", "id": "OPENVAS:1361412562310120175", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310120175", "sourceData": "# Copyright (C) 2015 Eero Volotinen\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) of their respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.120175\");\n script_version(\"2020-03-13T13:19:50+0000\");\n script_tag(name:\"creation_date\", value:\"2015-09-08 13:19:14 +0200 (Tue, 08 Sep 2015)\");\n script_tag(name:\"last_modification\", value:\"2020-03-13 13:19:50 +0000 (Fri, 13 Mar 2020)\");\n script_name(\"Amazon Linux: Security Advisory (ALAS-2012-146)\");\n script_tag(name:\"insight\", value:\"A flaw was found in the DNS64 implementation in BIND. If a remote attacker sent a specially-crafted query to a named server, named could exit unexpectedly with an assertion failure. Note that DNS64 support is not enabled by default. (CVE-2012-5688 )\");\n script_tag(name:\"solution\", value:\"Run yum update bind to update your system.\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"URL\", value:\"https://alas.aws.amazon.com/ALAS-2012-146.html\");\n script_cve_id(\"CVE-2012-5688\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/amazon_linux\", \"ssh/login/release\");\n script_category(ACT_GATHER_INFO);\n script_tag(name:\"summary\", value:\"The remote host is missing an update announced via the referenced Security Advisory.\");\n script_copyright(\"Copyright (C) 2015 Eero Volotinen\");\n script_family(\"Amazon Linux Local Security Checks\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"AMAZON\") {\n if(!isnull(res = isrpmvuln(pkg:\"bind-chroot\", rpm:\"bind-chroot~9.8.2~0.10.rc1.26.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"bind-devel\", rpm:\"bind-devel~9.8.2~0.10.rc1.26.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"bind-sdb\", rpm:\"bind-sdb~9.8.2~0.10.rc1.26.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"bind-utils\", rpm:\"bind-utils~9.8.2~0.10.rc1.26.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"bind\", rpm:\"bind~9.8.2~0.10.rc1.26.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"bind-libs\", rpm:\"bind-libs~9.8.2~0.10.rc1.26.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"bind-debuginfo\", rpm:\"bind-debuginfo~9.8.2~0.10.rc1.26.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2018-01-06T13:07:16", "description": "Check for the Version of bind", "cvss3": {}, "published": "2012-12-14T00:00:00", "type": "openvas", "title": "Fedora Update for bind FEDORA-2012-19830", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-5688", "CVE-2012-1667"], "modified": "2018-01-04T00:00:00", "id": "OPENVAS:864931", "href": "http://plugins.openvas.org/nasl.php?oid=864931", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for bind FEDORA-2012-19830\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_affected = \"bind on Fedora 17\";\ntag_insight = \"BIND (Berkeley Internet Name Domain) is an implementation of the DNS\n (Domain Name System) protocols. BIND includes a DNS server (named),\n which resolves host names to IP addresses; a resolver library\n (routines for applications to use when interfacing with DNS); and\n tools for verifying that the DNS server is operating properly.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.fedoraproject.org/pipermail/package-announce/2012-December/094591.html\");\n script_id(864931);\n script_version(\"$Revision: 8285 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-01-04 07:29:16 +0100 (Thu, 04 Jan 2018) $\");\n script_tag(name:\"creation_date\", value:\"2012-12-14 09:49:53 +0530 (Fri, 14 Dec 2012)\");\n script_cve_id(\"CVE-2012-5688\", \"CVE-2012-1667\");\n script_tag(name:\"cvss_base\", value:\"8.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:N/A:C\");\n script_xref(name: \"FEDORA\", value: \"2012-19830\");\n script_name(\"Fedora Update for bind FEDORA-2012-19830\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of bind\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC17\")\n{\n\n if ((res = isrpmvuln(pkg:\"bind\", rpm:\"bind~9.9.2~3.P1.fc17\", rls:\"FC17\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 8.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:NONE/A:COMPLETE/"}}, {"lastseen": "2019-05-29T18:38:50", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2012-12-14T00:00:00", "type": "openvas", "title": "Fedora Update for bind FEDORA-2012-19830", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-5688", "CVE-2012-1667"], "modified": "2019-03-15T00:00:00", "id": "OPENVAS:1361412562310864931", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310864931", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for bind FEDORA-2012-19830\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"http://lists.fedoraproject.org/pipermail/package-announce/2012-December/094591.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.864931\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2012-12-14 09:49:53 +0530 (Fri, 14 Dec 2012)\");\n script_cve_id(\"CVE-2012-5688\", \"CVE-2012-1667\");\n script_tag(name:\"cvss_base\", value:\"8.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:N/A:C\");\n script_xref(name:\"FEDORA\", value:\"2012-19830\");\n script_name(\"Fedora Update for bind FEDORA-2012-19830\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'bind'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC17\");\n script_tag(name:\"affected\", value:\"bind on Fedora 17\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC17\")\n{\n\n if ((res = isrpmvuln(pkg:\"bind\", rpm:\"bind~9.9.2~3.P1.fc17\", rls:\"FC17\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 8.5, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:C"}}, {"lastseen": "2019-05-29T18:39:24", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2012-12-31T00:00:00", "type": "openvas", "title": "Fedora Update for bind FEDORA-2012-19822", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-5688", "CVE-2012-1667", "CVE-2011-4313"], "modified": "2019-03-15T00:00:00", "id": "OPENVAS:1361412562310864963", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310864963", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for bind FEDORA-2012-19822\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"http://lists.fedoraproject.org/pipermail/package-announce/2012-December/095174.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.864963\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2012-12-31 10:36:22 +0530 (Mon, 31 Dec 2012)\");\n script_cve_id(\"CVE-2012-5688\", \"CVE-2012-1667\", \"CVE-2011-4313\");\n script_tag(name:\"cvss_base\", value:\"8.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:N/A:C\");\n script_xref(name:\"FEDORA\", value:\"2012-19822\");\n script_name(\"Fedora Update for bind FEDORA-2012-19822\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'bind'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC16\");\n script_tag(name:\"affected\", value:\"bind on Fedora 16\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC16\")\n{\n\n if ((res = isrpmvuln(pkg:\"bind\", rpm:\"bind~9.8.4~3.P1.fc16\", rls:\"FC16\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 8.5, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:C"}}, {"lastseen": "2018-01-02T10:56:27", "description": "Check for the Version of bind", "cvss3": {}, "published": "2012-12-31T00:00:00", "type": "openvas", "title": "Fedora Update for bind FEDORA-2012-19822", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-5688", "CVE-2012-1667", "CVE-2011-4313"], "modified": "2017-12-26T00:00:00", "id": "OPENVAS:864963", "href": "http://plugins.openvas.org/nasl.php?oid=864963", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for bind FEDORA-2012-19822\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_affected = \"bind on Fedora 16\";\ntag_insight = \"BIND (Berkeley Internet Name Domain) is an implementation of the DNS\n (Domain Name System) protocols. BIND includes a DNS server (named),\n which resolves host names to IP addresses; a resolver library\n (routines for applications to use when interfacing with DNS); and\n tools for verifying that the DNS server is operating properly.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.fedoraproject.org/pipermail/package-announce/2012-December/095174.html\");\n script_id(864963);\n script_version(\"$Revision: 8245 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-26 07:29:59 +0100 (Tue, 26 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2012-12-31 10:36:22 +0530 (Mon, 31 Dec 2012)\");\n script_cve_id(\"CVE-2012-5688\", \"CVE-2012-1667\", \"CVE-2011-4313\");\n script_tag(name:\"cvss_base\", value:\"8.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:N/A:C\");\n script_xref(name: \"FEDORA\", value: \"2012-19822\");\n script_name(\"Fedora Update for bind FEDORA-2012-19822\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of bind\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC16\")\n{\n\n if ((res = isrpmvuln(pkg:\"bind\", rpm:\"bind~9.8.4~3.P1.fc16\", rls:\"FC16\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 8.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:NONE/A:COMPLETE/"}}, {"lastseen": "2019-05-29T18:37:07", "description": "Gentoo Linux Local Security Checks GLSA 201401-34", "cvss3": {}, "published": "2015-09-29T00:00:00", "type": "openvas", "title": "Gentoo Security Advisory GLSA 201401-34", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-5689", "CVE-2013-2266", "CVE-2013-3919", "CVE-2012-5688", "CVE-2012-5166", "CVE-2014-0591", "CVE-2013-4854"], "modified": "2018-10-26T00:00:00", "id": "OPENVAS:1361412562310121131", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310121131", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: glsa-201401-34.nasl 12128 2018-10-26 13:35:25Z cfischer $\n#\n# Gentoo Linux security check\n#\n# Authors:\n# Eero Volotinen <eero.volotinen@solinor.com>\n#\n# Copyright:\n# Copyright (c) 2015 Eero Volotinen, http://solinor.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.121131\");\n script_version(\"$Revision: 12128 $\");\n script_tag(name:\"creation_date\", value:\"2015-09-29 11:26:47 +0300 (Tue, 29 Sep 2015)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-10-26 15:35:25 +0200 (Fri, 26 Oct 2018) $\");\n script_name(\"Gentoo Security Advisory GLSA 201401-34\");\n script_tag(name:\"insight\", value:\"Multiple vulnerabilities have been discovered in BIND. Please review the CVE identifiers referenced below for details.\");\n script_tag(name:\"solution\", value:\"Update the affected packages to the latest available version.\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"URL\", value:\"https://security.gentoo.org/glsa/201401-34\");\n script_cve_id(\"CVE-2012-5166\", \"CVE-2012-5688\", \"CVE-2012-5689\", \"CVE-2013-2266\", \"CVE-2013-3919\", \"CVE-2013-4854\", \"CVE-2014-0591\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/gentoo\", \"ssh/login/pkg\");\n script_category(ACT_GATHER_INFO);\n script_tag(name:\"summary\", value:\"Gentoo Linux Local Security Checks GLSA 201401-34\");\n script_copyright(\"Eero Volotinen\");\n script_family(\"Gentoo Local Security Checks\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-gentoo.inc\");\n\nres = \"\";\nreport = \"\";\n\nif((res=ispkgvuln(pkg:\"net-dns/bind\", unaffected: make_list(\"ge 9.9.4_p2\"), vulnerable: make_list(\"lt 9.9.4_p2\"))) != NULL) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99);\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}], "oraclelinux": [{"lastseen": "2019-05-29T18:38:37", "description": "[32:9.8.2-0.10.rc1.6]\n- fix CVE-2012-5688", "cvss3": {}, "published": "2012-12-06T00:00:00", "type": "oraclelinux", "title": "bind security update", "bulletinFamily": "unix", "cvss2": {}, "cvelist": ["CVE-2012-5688"], "modified": "2012-12-06T00:00:00", "id": "ELSA-2012-1549", "href": "http://linux.oracle.com/errata/ELSA-2012-1549.html", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2019-05-29T18:34:11", "description": "[32:9.8.2-0.17.rc1.0.2.el6.3]\r\n- bump up version and rebuild\r\n \n[32:9.8.2-0.17.rc1.0.1.el6.3]\r\n- add rrl.h into include dirs\r\n \n[32:9.8.2-0.27.rc1.3]\r\n- remove one bogus file from /usr/share/doc, introduced by RRL patch\r\n \n[32:9.8.2-0.17.rc1.2]\r\n- fix CVE-2012-5689\r\n \n[32:9.8.2-0.17.rc1.1]\r\n- add response rate limit patch (#873624)\r\n \n[32:9.8.2-0.17.rc1]\r\n- fix CVE-2012-5688\r\n \n[32:9.8.2-0.16.rc1]\r\n- initscript: silence spurious \"named.pid: No such file\" error\r\n \n[32:9.8.2-0.15.rc1]\r\n- fix CVE-2012-5166\r\n \n[32:9.8.2-0.14.rc1]\r\n- allow forward{,ers} statement in static-stub zones\r\n \n[32:9.8.2-0.13.rc1]\r\n- fix CVE-2012-4244\r\n \n[32:9.8.2-0.12.rc1]\r\n- fix CVE-2012-3817\r\n \n[32:9.8.2-0.11.rc1]\r\n- fix rbtnode.deadlink INSIST failures in rbtdb.c (#837165)", "cvss3": {}, "published": "2013-02-28T00:00:00", "type": "oraclelinux", "title": "bind security and enhancement update", "bulletinFamily": "unix", "cvss2": {}, "cvelist": ["CVE-2012-5689", "CVE-2012-3817", "CVE-2012-5688", "CVE-2012-5166", "CVE-2012-4244"], "modified": "2013-02-28T00:00:00", "id": "ELSA-2013-0550", "href": "http://linux.oracle.com/errata/ELSA-2013-0550.html", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2022-02-10T00:00:00", "description": "[32:9.8.2-0.68.rc1.0.3.8]\n- Backport fix for CVE-2018-5741 [Orabug: 33496185]\n[32:9.8.2-0.68.rc1.0.2.8]\n- Backport possible assertion failure on DNAME processing (CVE-2021-25215)\n[32:9.8.2-0.68.rc1.0.1.8]\n- Backport the fix for buffer overflow (CVE-2020-8625) (Orabug: 32588749)\n[32:9.8.2-0.68.rc1.8]\n- Fix tsig-request verify (CVE-2020-8622)\n[32:9.8.2-0.68.rc1.7]\n- Correct tests covering CVE-2020-8617\n[32:9.8.2-0.68.rc1.6]\n- Add additional fix to limit recursions\n[32:9.8.2-0.68.rc1.5]\n- Add CVE tests to codebase\n[32:9.8.2-0.68.rc1.4]\n- Limit number of queries triggered by a request (CVE-2020-8616)\n- Fix invalid tsig request (CVE-2020-8617)\n[32:9.8.2-0.68.rc1.3]\n- Use only selected documentation files\n[32:9.8.2-0.68.rc1.2]\n- Fix CVE-2018-5743\n[32:9.8.2-0.68.rc1.1]\n- Fix CVE-2018-5740\n[32:9.8.2-0.68.rc1]\n- Fix CVE-2017-3145\n[32:9.8.2-0.67.rc1]\n- Change EDNS flags only after successful query (#1416035)\n- Fix crash in ldap driver at bind-sdb stop (#1426626)\n[32:9.8.2-0.66.rc1]\n- Fix CVE-2017-3142 and CVE-2017-3143\n[32:9.8.2-0.65.rc1]\n- Update root servers and trust anchors\n[32:9.8.2-0.64.rc1]\n- Fix DNSKEY that encountered a CNAME (#1447872, ISC change 3391)\n[32:9.8.2-0.63.rc1]\n- Fix CVE-2017-3136 (ISC change 4575)\n- Fix CVE-2017-3137 (ISC change 4578)\n[32:9.8.2-0.62.rc1]\n- Fix and test caching CNAME before DNAME (ISC change 4558)\n[32:9.8.2-0.61.rc1]\n- Fix CVE-2016-9147 (ISC change 4510)\n- Fix regression introduced by CVE-2016-8864 (ISC change 4530)\n[32:9.8.2-0.60.rc1]\n- Restore SELinux contexts before named restart\n[32:9.8.2-0.59.rc1]\n- Use /lib or /lib64 only if directory in chroot already exists\n- Tighten NSS library pattern, escape chroot mount path\n[32:9.8.2-0.58.rc1]\n- Fix CVE-2016-8864\n[32:9.8.2-0.57.rc1]\n- Do not change lib permissions in chroot (#1321239)\n- Support WKS records in chroot (#1297562)\n[32:9.8.2-0.56.rc1]\n- Do not include patch backup in docs (fixes #1325081 patch)\n[32:9.8.2-0.55.rc1]\n- Backported relevant parts of [RT #39567] (#1259923)\n[32:9.8.2-0.54.rc1]\n- Increase ISC_SOCKET_MAXEVENTS to 2048 (#1326283)\n[32:9.8.2-0.53.rc1]\n- Fix multiple realms in nsupdate script like upstream (#1313286)\n[32:9.8.2-0.52.rc1]\n- Fix multiple realm in nsupdate script (#1313286)\n[32:9.8.2-0.51.rc1]\n- Use resolver-query-timeout high enough to recover all forwarders (#1325081)\n[32:9.8.2-0.50.rc1]\n- Fix CVE-2016-2848\n[32:9.8.2-0.49.rc1]\n- Fix infinite loop in start_lookup (#1306504)\n[32:9.8.2-0.48.rc1]\n- Fix CVE-2016-2776\n[32:9.8.2-0.47.rc1]\n- Fix CVE-2016-1285 and CVE-2016-1286\n[32:9.8.2-0.46.rc1]\n- Fix CVE-2015-8704\n[32:9.8.2-0.45.rc1]\n- Updated named.ca hints file to the latest version (#1267991)\n[32:9.8.2-0.44.rc1]\n- Fix CVE-2015-8000\n[32:9.8.2-0.43.rc1]\n- Fix excessive queries caused by DS chasing with stub zones when DNSSEC is not used (#1227189)\n- Added the fixed tarball with configuration to Sources (Related: #1223359)\n[32:9.8.2-0.42.rc1]\n- Don't use ISC's DLV by default (#1223359)\n[32:9.8.2-0.41.rc1]\n- Added support for CAA records (#1252611)\n[32:9.8.2-0.40.rc1]\n- Fix CVE-2015-5722\n[32:9.8.2-0.39.rc1]\n- Fix CVE-2015-5477\n[32:9.8.2-0.38.rc1]\n- Fix CVE-2015-4620\n[32:9.8.2-0.37.rc1]\n- Resolves: 1215687 - DNS resolution failure in high load environment with\n SERVFAIL and 'out of memory/success' in the log\n[32:9.8.2-0.36.rc1]\n- Fix CVE-2015-1349\n[32:9.8.2-0.35.rc1]\n- Enable RPZ-NSIP and RPZ-NSDNAME during compilation (#1176476)\n[32:9.8.2-0.34.rc1]\n- Fix race condition when using isc__begin_beginexclusive (#1175321)\n[32:9.8.2-0.33.rc1]\n- Sanitize SDB API to better handle database errors (#1146893)\n[32:9.8.2-0.32.rc1]\n- Fix CVE-2014-8500 (#1171974)\n[32:9.8.2-0.31.rc1]\n- Fix RRL slip behavior when set to 1 (#1112356)\n- Fix issue causing bind to hang after reload if using DYNDB (#1142152)\n[32:9.8.2-0.30.rc1]\n- Use /dev/urandom when generating rndc.key file (#951255)\n[32:9.8.2-0.29.rc1]\n- Remove bogus file from /usr/share/doc, introduced by fix for bug #1092035\n[32:9.8.2-0.28.rc1]\n- Add support for TLSA resource records (#956685)\n- Increase defaults for lwresd workers and make workers and client objects number configurable (#1092035)\n[32:9.8.2-0.27.rc1]\n- Fix segmentation fault in nsupdate when -r option is used (#1064045)\n- Fix race condition on send buffer in host tool when sending UDP query (#1008827)\n- Allow authentication using TSIG in allow-notify configuration statement (#1044545)\n- Fix SELinux context of /var/named/chroot/etc/localtime (#902431)\n- Include updated named.ca file with root server addresses (#917356)\n- Don't generate rndc.key if there is rndc.conf on start-up (#997743)\n- Fix dig man page regarding how to disable IDN (#1023045)\n- Handle ICMP Destination unreachable (Protocol unreachable) response (#1066876)\n[32:9.8.2-0.26.rc1]\n- Configure BIND with --with-dlopen=yes to support dynamically loadable DLZ drivers (#846065)\n- Fix initscript to return correct exit value when calling checkconfig/configtest/check/test (#848033)\n- Don't (un)mount chroot filesystem when running initscript command configtest with running server (#851123)\n- Fix zone2sqlite tool to accept zones containing '.' or '-' or starting with a digit (#919414)\n- Fix initscript not to mount chroot filesystem is named is already running (#948743)\n- Fix initscript to check if the PID in PID-file is really s PID of running named server (#980632)\n- Correct the installed documentation ownership (#1051283)\n[32:9.8.2-0.25.rc1]\n- configure with --enable-filter-aaaa to enable use of filter-aaaa-on-v4 option (#1025008)\n- Fix race condition when destroying a resolver fetch object (#993612)\n- Fix the RRL functionality to include referrals-per-second and nodata-per-second options (#1036700)\n- Fix segfault on SERVFAIL to NXDOMAIN failover (#919545)\n[32:9.8.2-0.24.rc1]\n- Fix CVE-2014-0591\n[32:9.8.2-0.23.rc1]\n- Fix gssapictx memory leak (#911167)\n[32:9.8.2-0.22.rc1]\n- fix CVE-2013-4854\n[32:9.8.2-0.21.rc1]\n- fix CVE-2013-2266\n- ship dns/rrl.h in -devel subpkg\n[32:9.8.2-0.20.rc1]\n- remove one bogus file from /usr/share/doc, introduced by RRL patch\n[32:9.8.2-0.19.rc1]\n- fix CVE-2012-5689\n[32:9.8.2-0.18.rc1]\n- add response rate limit patch (#873624)\n[32:9.8.2-0.17.rc1]\n- fix CVE-2012-5688\n[32:9.8.2-0.16.rc1]\n- initscript: silence spurious 'named.pid: No such file' error\n[32:9.8.2-0.15.rc1]\n- fix CVE-2012-5166\n[32:9.8.2-0.14.rc1]\n- allow forward{,ers} statement in static-stub zones\n[32:9.8.2-0.13.rc1]\n- fix CVE-2012-4244\n[32:9.8.2-0.12.rc1]\n- fix CVE-2012-3817\n[32:9.8.2-0.11.rc1]\n- fix rbtnode.deadlink INSIST failures in rbtdb.c (#837165)\n[32:9.8.2-0.10.rc1]\n- fix CVE-2012-1667\n[32:9.8.2-0.9.rc1]\n- fix race condition in the resolver module\n- nslookup: return non-zero exit code when fail to get answer (#816164)\n[32:9.8.2-0.8.rc1]\n- initscript: don't umount /var/named when didn't mount it\n[32:9.8.2-0.7.rc1]\n- don't fail when logfile cannot be opened (#809084)\n[32:9.8.2-0.6.rc1]\n- fix multilib regression in bind-devel (#800053)\n[32:9.8.2-0.5.rc1]\n- fix errors reported by Coverity\n- be more strict when caching NS RRsets (CVE-2012-1033)\n[32:9.8.2-0.4.rc1]\n- load dynamic-db plugins later (#795414)\n[32:9.8.2-0.3.rc1]\n- decrease severity of various errors related to outside DNS environment\n (#788870)\n- fixed various bind-chroot packaging errors (#789886)\n- use portreserve to reserve rndc control port (#790682)\n[32:9.8.2-0.2.rc1]\n- harden dns_zone_setmasterswithkeys() to avoid INSIST failures\n- build with '--enable-fixed-rrset'\n- fix potential memory leak in code which processes rndc authentication\n (#749582)\n- generate rndc.key during (#768798)\n- nslookup: improve handling of AA responses with recursion off\n- removed obsolete bind97-rh714049.patch patch\n[32:9.8.2-0.1.rc1]\n- update to 9.8.2rc1\n- patches merged\n - bind97-rh754398.patch\n - bind97-rh700097.patch\n - bind97-rh734502.patch\n - bind97-rh746694-1.patch\n - bind97-rh746694-2.patch\n - bind97-rh739406-1.patch\n - bind97-rh739406-2.patch\n- ship DNSKEY for root zone in default configuration\n[32:9.7.3-10.P3]\n- disable atomic ops on ppc* because they caused named to hang/crash\n[32:9.7.3-9.P3]\n- fix race condition in resolver.c:validated()\n- improve error handling in zone.c:zone_refreshkeys() to avoid\n hang during shutdown\n[32:9.7.3-8.P3]\n- fix DOS against recursive servers (#754398)\n[32:9.7.3-7.P3]\n- fix memory leak in nsupdate when using SIG(0) keys\n[32:9.7.3-6.P3]\n- load/unload dyndb plugins on appropriate places to avoid crashes (#725577)\n- nsupdate could have failed if server has multiple IPs and the first\n was unreachable (#714049)\n- nsupdate returned zero when target zone didn't exist (#700097)\n- readd configtest target to initscript\n- print 'the working directory is not writable' as debug message\n- fix some Coverity warnings\n[32:9.7.3-5.P3]\n- fix rare race condition in request.c\n[32:9.7.3-4.P3]\n- update to 9.7.3-P3 (CVE-2011-2464)\n[32:9.7.3-3.P1]\n- update to 9.7.3-P1 (CVE-2011-1910)\n[32:9.7.3-2]\n- don't generate rndc.key during installation\n[32:9.7.3-1]\n- update to 9.7.3 (CVE-2011-0414)\n- patches merged\n - bind97-gsstsig.patch\n - bind97-rh664401.patch\n - bind97-rh623638.patch\n[32:9.7.2-8.P3]\n- regenerate fixed nsupdate manual page\n[32:9.7.2-7.P3]\n- improve host/dig resolv.conf parser (#rh669163)\n- improve internal test suite\n- don't mention that HMAC-MD5 is the only one TSIG algorighm\n in nsupdate manpage\n- initscript: sybsys name is always named, not named-sdb\n[32:9.7.2-6.P3]\n- named could die on exit after negotiating a GSS-TSIG key (#653486)\n- fix typo in initscript\n[32:9.7.2-5.P3]\n- include root zone DNSKEY in the bind package (#667375)\n[32:9.7.2-4.P3]\n- solve conflict between i686 and x86_64 bind-devel packages (#658045)\n- fix 'service named status' when used with named-sdb\n- fix 'krb5-self' update-policy rule processing (#664401)\n- don't check MD5, size and mtime of sysconfig/named\n[32:9.7.2-3.P3]\n- use same atomic operations on both ppc and ppc64 (#623638)\n- add new option DISABLE_ZONE_CHECKING to sysconfig/named (#623673)\n- document dig exit codes\n- add Requires: bind-libs to bind subpkgs\n- remove statement about system-config-bind from named.8 manpage (#660676)\n[32:9.7.2-2.P3]\n- host utility now honors 'attempts', 'timeout' and 'debug' options in\n resolv.conf (#622764)\n- initscript should kill only the 'correct' named process (#622785)\n- attempt to reconnect to PostgreSQL during each query if the initial\n connection failed (#623190)\n[32:9.7.2-1.P3]\n- update to 9.7.2-P3 (#623122)\n- patch bind97-managed-keyfile.patch replaced by bind97-compat-keysdir.patch\n- patches merged\n - bind97-rh554316.patch\n - bind97-rh576906.patch\n[32:9.7.0-5.P2]\n- update to 9.7.0-P2\n[32:9.7.0-4.P1]\n- fix occassional crash on keytable.c:286 (#554316)\n- active query might be destroyed in resume_dslookup() which triggered REQUIRE\n failure (#507429)\n[32:9.7.0-3.P1]\n- update to 9.7.0-P1 release\n[32:9.7.0-2]\n- improve automatic DNSSEC reconfiguration trigger\n- initscript now returns 2 in case that action doesn't exist (#523435)\n- enable/disable chroot when bind-chroot is installed/uninstalled\n[32:9.7.0-1]\n- update to production 9.7.0 release\n[32:9.7.0-0.14.rc2]\n- obsolete dnssec-conf\n- automatically update configuration from old dnssec-conf based\n- improve default configuration; enable DLV by default\n- remove obsolete triggerpostun from bind-libs subpackage\n[32:9.7.0-0.13.rc2]\n- update to 9.7.0rc2 bugfix release (CVE-2010-0097 and CVE-2010-0290)\n[32:9.7.0-0.12.rc1]\n- initscript LSB related fixes (#523435)\n- revert the 'DEBUG' feature (#510283), it causes too many problems (#545128)\n[32:9.7.0-0.11.rc1]\n- disable PKCS11 support. PKCS11 support in openssl is not available in RHEL6\n[32:9.7.0-0.10.rc1]\n- update to 9.7.0rc1\n- bind97-headers.patch merged\n- update default configuration\n[32:9.7.0-0.9.b3]\n- update to 9.7.0b3\n[32:9.7.0-0.8.b2]\n- install isc/namespace.h header\n[32:9.7.0-0.7.b2]\n- update to 9.7.0b2\n[32:9.7.0-0.6.b1]\n- update to 9.7.0b1\n- add bind-pkcs11 subpackage to support PKCS11 compatible keystores for DNSSEC\n keys\n[32:9.7.0-0.5.a3]\n- don't package named-bootconf utility, it is very outdated and unneeded\n[32:9.7.0-0.4.a3]\n- determine file size via instead of 32_details\n32_list\n32_list_to_copy\n32_list_to_copy_details\n32_list_to_copy_details.out\n32_list_to_copy_details.out_1\n32_list_to_remove_and_ln\n64_details\n64_list\n64_list_to_copy\n64_list_to_copy_details\n64_list_to_copy_details.out\n64_list_to_copy_details.out_1\n64_list_to_remove_and_ln\n6.6\n67_32_list\n67_32_list_1\n67_64_list\n67_64_list_1\n67_src_list\n67_src_list_1\nbak\nbaselist\nbaselist.out\nctllist.ELBA-2020-5554-6\nctllist.ELSA-2022-9117-6\nctllist.RHBA-2020-3543-6\nctllist.RHSA-2019-3756-6\ni386_rpms\nk\nnext.ctllist.ELSA-2015-3055-6\npending\nsav.ctllist.RHBA-2017-3213-6a\nsrc_32_list_to_copy_details\nsrc_32_list_to_copy_details.out\nsrc_32_list_to_copy_details.out_1\nsrc_64_list_to_copy_details\nsrc_64_list_to_copy_details.out\nsrc_64_list_to_copy_details.out_1\nsrc_details\nsrc_list\nsrc_list_to_copy\nsrc_list_to_copy_32\nsrc_list_to_copy_64\nsrc_list_to_remove_and_ln\nsrc_list_to_remove_and_ln_64\nsrc_rpms\nx86_64_rpms (#523682)\n[32:9.7.0-0.3.a3]\n- update to 9.7.0a3\n[32:9.7.0-0.2.a2]\n- improve chroot related documentation (#507795)\n- add NetworkManager dispatcher script to reload named when network interface is\n activated/deactivated (#490275)\n- don't set/unset named_write_master_zones SELinux boolean every time in\n initscript, modify it only when it's actually needed\n[32:9.7.0-0.1.a2]\n- update to 9.7.0a2\n- merged patches\n - bind-96-db_unregister.patch\n - bind96-rh507469.patch\n[32:9.6.1-9.P1]\n- next attempt to fix the postun trigger (#520385)\n- remove obsolete bind-9.3.1rc1-fix_libbind_includedir.patch\n[32:9.6.1-8.P1]\n- rebuilt with new openssl\n[32:9.6.1-7.P1]\n- update the patch for dynamic loading of database backends\n[32:9.6.1-6.P1]\n- 9.6.1-P1 release (CVE-2009-0696)\n- fix postun trigger (#513016, hopefully)\n[32:9.6.1-5]\n- Rebuilt for https://fedoraproject.org/wiki/Fedora_12_Mass_Rebuild\n[32:9.6.1-4]\n- remove useless bind-9.3.3rc2-rndckey.patch\n[32:9.6.1-3]\n- fix broken symlinks in bind-libs (#509635)\n- fix typos in /etc/sysconfig/named (#509650)\n- add DEBUG option to /etc/sysconfig/named (#510283)\n[32:9.6.1-2]\n- improved 'chroot automount' patches (#504596)\n- host should fail if specified server doesn't respond (#507469)\n[32:9.6.1-1]\n- 9.6.1 release\n- simplify chroot maintenance. Important files and directories are mounted into\n chroot (see /etc/sysconfig/named for more info, #504596)\n- fix doc/named.conf.default perms\n[32:9.6.1-0.4.rc1]\n- 9.6.1rc1 release\n[32:9.6.1-0.3.b1]\n- update the patch for dynamic loading of database backends\n- create %{_libdir}/bind directory\n- copy default named.conf to doc directory, shared with s-c-bind (atkac)\n[32:9.6.1-0.2.b1]\n- update the patch for dynamic loading of database backends\n- fix dns_db_unregister()\n- useradd now takes '-N' instead of '-n' (atkac, #495726)\n- print nicer error msg when zone file is actually a directory (atkac, #490837)\n[32:9.6.1-0.1.b1]\n- 9.6.1b1 release\n- patches merged\n - bind-96-isc_header.patch\n - bind-95-rh469440.patch\n - bind-96-realloc.patch\n - bind9-fedora-0001.diff\n- use -version-number instead of -version-info libtool param\n[32:9.6.0-11.1.P1]\n- logrotate configuration file now points to /var/named/data/named.run by\n default (#489986)\n[32:9.6.0-11.P1]\n- fall back to insecure mode when no supported DNSSEC algorithm is found\n instead of SERVFAIL\n- don't fall back to non-EDNS0 queries when DO bit is set\n[32:9.6.0-10.P1]\n- enable DNSSEC only if it is enabled in sysconfig/dnssec\n[32:9.6.0-9.P1]\n- add DNSSEC support to initscript, enabled it per default\n- add requires dnssec-conf\n[32:9.6.0-8.P1]\n- fire away libbind, it is now separate package\n[32:9.6.0-7.P1]\n- fixed some read buffer overflows (upstream)\n[32:9.6.0-6.P1]\n- Rebuilt for https://fedoraproject.org/wiki/Fedora_11_Mass_Rebuild\n[32:9.6.0-5.P1]\n- update the patch for dynamic loading of database backends\n- include iterated_hash.h\n[32:9.6.0-4.P1]\n- rebuild for dependencies\n[32:9.6.0-3.P1]\n- rebuild against new openssl\n[32:9.6.0-2.P1]\n- 9.6.0-P1 release (CVE-2009-0025)\n[32:9.6.0-1]\n- Happy new year\n- 9.6.0 release\n[32:9.6.0-0.7.rc2]\n- 9.6.0rc2 release\n- bind-96-rh475120.patch merged\n[32:9.6.0-0.6.rc1]\n- add patch for dynamic loading of database backends\n[32:9.6.0-0.5.1.rc1]\n- allow to reuse address for non-random query-source ports (#475120)\n[32:9.6.0-0.5.rc1]\n- 9.6.0rc1 release\n- patches merged\n - bind-9.2.0rc3-varrun.patch\n - bind-95-sdlz-include.patch\n - bind-96-libxml2.patch\n- fixed rare use-after-free problem in host utility (#452060)\n- enabled chase of DNSSEC signature chains in dig\n[32:9.6.0-0.4.1.b1]\n- improved sample config file (#473586)\n[32:9.6.0-0.4.b1]\n- reverted previous change, koji doesn't like it\n[32:9.6.0-0.3.b1]\n- build bind-chroot as noarch\n[32:9.6.0-0.2.1.b1]\n- updates due libtool 2.2.6\n- don't pass -DLDAP_DEPRECATED to cpp, handle it directly in sources\n[32:9.6.0-0.2.b1]\n- make statistics http server working, patch backported from 9.6 HEAD\n[32:9.6.0-0.1.b1]\n- 9.6.0b1 release\n- don't build ODBC and Berkeley DB DLZ drivers\n- end of bind-chroot-admin script, copy config files to chroot manually\n- /proc doesn't have to be mounted to chroot\n- temporary use libbind from 9.5 series, noone has been released for 9.6 yet\n[32:9.5.1-0.8.4.b2]\n- dig/host: use only IPv4 addresses when -4 option is specified (#469440)\n[32:9.5.1-0.8.2.b2]\n- removed unneeded bind-9.4.1-ldap-api.patch\n[32:9.5.1-0.8.1.b2]\n- ship dns/{s,}dlz.h and isc/radix.h in bind-devel\n[32:9.5.1-0.8.b2]\n- removed bind-9.4.0-dnssec-directory.patch, it is wrong\n[32:9.5.1-0.7.b2]\n- 9.5.1b2 release\n- patches merged\n - bind95-rh454783.patch\n - bind-9.5-edns.patch\n - bind95-rh450995.patch\n - bind95-rh457175.patch\n[32:9.5.1-0.6.b1]\n- IDN output strings didn't honour locale settings (#461409)\n[32:9.5.1-0.5.b1]\n- disable transfer stats on DLZ zones (#454783)\n[32:9.5.1-0.4.b1]\n- add forgotten patch for #457175\n- build with -O2\n[32:9.5.1-0.3.b1]\n- static libraries are no longer supported\n- IP acls weren't merged correctly (#457175)\n- use fPIE on sparcv9/sparc64 (Dennis Gilmore)\n- add sparc64 to list of 64bit arches in spec (Dennis Gilmore)\n[32:9.5.1-0.2.b1]\n- updated patches due new rpm (--fuzz=0 patch parameter)\n[32:9.5.1-0.1.1.b1]\n- use %patch0 for Patch0 (#455061)\n- correct source address (#455118)\n[32:9.5.1-0.1.b1]\n- 9.5.1b1 release (CVE-2008-1447)\n- dropped bind-9.5-recv-race.patch because upstream doesn't want it\n[32:9.5.0-37.1]\n- update default named.conf statements (#452708)\n[32:9.5.0-37]\n- some compat changes to fix building on RHEL4\n[32:9.5.0-36.3]\n- fixed typo in %posttrans script\n[32:9.5.0-36.2]\n- parse inner acls correctly (#450995)\n[32:9.5.0-36.1]\n- removed dns-keygen utility in favour of rndc-confgen -a (#449287)\n- some minor sample fixes (#449274)\n[32:9.5.0-36]\n- updated to 9.5.0 final\n- use getifaddrs to find available interfaces\n[32:9.5.0-35.rc1]\n- make /var/run/named writable by named (#448277)\n- fixed one non-utf8 file\n[32:9.5.0-34.rc1]\n- fixes needed to pass package review (#225614)\n[32:9.5.0-33.1.rc1]\n- bind-chroot now depends on bind (#446477)\n[32:9.5.0-33.rc1]\n- updated to 9.5.0rc1\n- merged patches\n - bind-9.5-libcap.patch\n- make binaries readable by others (#427826)\n[32:9.5.0-32.b3]\n- reverted 'any' patch, upstream says not needed\n- log EDNS failure only when we really switch to plain EDNS (#275091)\n- detect configuration file better\n[32:9.5.0-31.1.b3]\n- addresses 0.0.0.0 and ::0 really match any (#275091, comment #28)\n[32:9.5.0-31.b3]\n- readded bind-9.5-libcap.patch\n- added bind-9.5-recv-race.patch from F8 branch (#400461)\n[32:9.5.0-30.1.b3]\n- build Berkeley DB DLZ backend\n[32:9.5.0-30.b3]\n- 9.5.0b3 release\n- dropped patches (upstream)\n - bind-9.5-transfer-segv.patch\n - bind-9.5-mudflap.patch\n - bind-9.5.0-generate-xml.patch\n - bind-9.5-libcap.patch\n[32:9.5.0-29.3.b2]\n- fixed named.conf.sample file (#437569)\n[32:9.5.0-29.2.b2]\n- fixed URLs\n[32:9.5.0-29.1.b2]\n- BuildRequires cleanup\n[32:9.5.0-29.b2]\n- rebuild without mudflap (#434159)\n[32:9.5.0-28.b2]\n- port named to use libcap library, enable threads (#433102)\n- removed some unneeded Requires\n[32:9.5.0-27.b2]\n- removed conditional build with libefence (use -fmudflapth instead)\n- fixed building of DLZ stuff (#432497)\n- do not build Berkeley DB DLZ backend\n- temporary build with --disable-linux-caps and without threads (#433102)\n- update named.ca file to affect IPv6 changes in root zone\n[32:9.5.0-26.b2]\n- build with -D_GNU_SOURCE (#431734)\n- improved fix for #253537, posttrans script is now used\n- improved fix for #400461\n- 9.5.0b2\n - bind-9.3.2b1-PIE.patch replaced by bind-9.5-PIE.patch\n - only named, named-sdb and lwresd are PIE\n - bind-9.5-sdb.patch has been updated\n - bind-9.5-libidn.patch has been updated\n - bind-9.4.0-sdb-sqlite-bld.patch replaced by bind-9.5-sdb-sqlite-bld.patch\n - removed bind-9.5-gssapi-header.patch (upstream)\n - removed bind-9.5-CVE-2008-0122.patch (upstream)\n- removed bind-9.2.2-nsl.patch\n- improved sdb_tools Makefile.in\n[32:9.5.0-25.b1]\n- fixed segfault during sending notifies (#400461)\n- rebuild with gcc 4.3 series\n[32:9.5.0-24.b1]\n- removed bind-9.3.2-prctl_set_dumpable.patch (upstream)\n- allow parallel building of libdns library\n- CVE-2008-0122\n[32:9.5.0-23.b1]\n- fixed initscript wait loop (#426382)\n- removed dependency on policycoreutils and libselinux (#426515)\n[32:9.5.0-22.b1]\n- fixed regression caused by libidn2 patch (#426348)\n[32:9.5.0-21.b1]\n- fixed typo in post section (CVE-2007-6283)\n[32:9.5.0-20.b1]\n- removed obsoleted triggers\n- CVE-2007-6283\n[32:9.5.0-19.2.b1]\n- added dst/gssapi.h to -devel subpackage (#419091)\n- improved fix for (#417431)\n[32:9.5.0-19.1.b1]\n- fixed shutdown with initscript when rndc doesn't work (#417431)\n- fixed IDN patch (#412241)\n[32:9.5.0-19.b1]\n- 9.5.0b1 (#405281, #392491)\n[32:9.5.0-18.6.a7]\n- Rebuild for deps\n[32:9.5.0-18.5.a7]\n- build with -O0\n[32:9.5.0-18.4.a7]\n- bind-9.5-random_ports.patch was removed because upstream doesn't\n like it. query-source{,v6} options are sufficient (#391931)\n- bind-chroot-admin called restorecon on /proc filesystem (#405281)\n[32:9.5.0-18.3.a7]\n- removed edns patch to keep compatibility with vanilla bind\n (#275091, comment #20)\n[32:9.5.0-18.2.a7]\n- use system port selector instead ISC's (#391931)\n[32:9.5.0-18.a7]\n- removed statement from initscript which passes -D to named\n[32:9.5.0-17.a7]\n- 9.5.0a7\n- dropped patches (upstream)\n - bind-9.5-update.patch\n - bind-9.5-pool_badfree.patch\n - bind-9.5-_res_errno.patch\n[32:9.5.0-16.5.a6]\n- added bind-sdb again, contains SDB modules and DLZ modules\n- bind-9.3.1rc1-sdb.patch replaced by bind-9.5-sdb.patch\n[32:9.5.0-16.4.a6]\n- removed Requires: openldap, postgresql, mysql, db4, unixODBC\n- new L.ROOT-SERVERS.NET address\n[32:9.5.0-16.3.a6]\n- completely disable DBUS\n[32:9.5.0-16.2.a6]\n- minor cleanup in bind-chroot-admin\n[32:9.5.0-16.1.a6]\n- fixed typo in initscript\n[32:9.5.0-16.a6]\n- disabled DBUS (dhcdbd doesn't exist & #339191)\n[32:9.5.0-15.1.a6]\n- fixed missing va_end () functions (#336601)\n- fixed memory leak when dbus initialization fails\n[32:9.5.0-15.a6]\n- corrected named.5 SDB statement (#326051)\n[32:9.5.0-14.a6]\n- added edns patch again (#275091)\n[32:9.5.0-13.a6]\n- removed bind-9.3.3-edns.patch patch (see #275091 for reasons)\n[32:9.5.0-12.4.a6]\n- build with O2\n- removed 'autotools' patch\n- bugfixing in bind-chroot-admin (#279901)\n[32:9.5.0-12.a6]\n- bind-9.5-2119_revert.patch and bind-9.5-fix_h_errno.patch are\n obsoleted by upstream bind-9.5-_res_errno.patch\n[32:9.5.0-11.9.a6]\n- fixed wrong resolver's dispatch pool cleanup (#275011, patch from\n tmraz redhat com)\n[32:9.5.0-11.3.a6]\n- initscript failure message is now printed correctly (#277981,\n Quentin Armitage (quentin armitage org uk) )\n[32:9.5.0-11.2.a6]\n- temporary revert ISC 2119 change and add 'libbind-errno' patch\n (#254501) again\n[32:9.5.0-11.1.a6]\n- removed end dots from Summary sections (skasal@redhat.com)\n- fixed wrong file creation by autotools patch (skasal@redhat.com)\n[32:9.5.0-11.a6]\n- start using --disable-isc-spnego configure option\n - remove bind-9.5-spnego-memory_management.patch (source isn't\n compiled)\n[32:9.5.0-10.2.a6]\n- added new initscript option KEYTAB_FILE which specified where\n is located kerberos .keytab file for named service\n- obsolete temporary bind-9.5-spnego-memory_management.patch by\n bind-9.5-gssapictx-free.patch which conforms BIND coding standards\n (#251853)\n[32:9.5.0-10.a6]\n- dropped direct dependency to /etc/openldap/schema directory\n- changed hardcoded paths to macros\n- fired away code which configure LDAP server\n[32:9.5.0-9.1.a6]\n- named could crash with SRV record UPDATE (#251336)\n[32:9.5.0-9.a6]\n- disable 64bit dlz driver patch on alpha and ia64 (#251298)\n- remove wrong malloc functions from lib/dns/spnego.c (#251853)\n[32:9.5.0-8.2.a6]\n- changed licence from BSD-like to ISC\n[32:9.5.0-8.1.a6]\n- disabled named on all runlevels by default\n[32:9.5.0-8.a6]\n- minor next improvements on autotools patch\n- dig and host utilities now using libidn instead idnkit for\n IDN support\n[32:9.5.0-7.a6]\n- binutils/gcc bug rebuild (#249435)\n[32:9.5.0-6.a6]\n- updated to 9.5.0a6 which contains fixes for CVE-2007-2925 and\n CVE-2007-2926\n- fixed building on 64bits\n[31:9.5.0a5-5]\n- integrated 'autotools' patch for testing purposes (upstream will\n accept it in future, for easier building)\n[31:9.5.0a5-4.1]\n- fixed DLZ drivers building on 64bit systems\n[31:9.5.0a5-4]\n- fixed relation between logrotated and chroot-ed named\n[31:9.5.0a5-3.9]\n- removed bind-sdb package (default named has compiled SDB backend now)\n- integrated DLZ (Dynamically loadable zones) drivers\n- integrated GSS-TSIG support (RFC 3645)\n- build with -O0 (many new features, potential core dumps will be more useful)\n[31:9.5.0a5-3.2]\n- initscript should be ready for parallel booting (#246878)\n[31:9.5.0a5-3]\n- handle integer overflow in isc_time_secondsastimet function gracefully (#247856)\n[31:9.5.0a5-2.2]\n- moved chroot configfiles into chroot subpackage (#248306)\n[31:9.5.0a5-2]\n- minor changes in default configuration\n- fix h_errno assigment during resolver initialization (unbounded recursion, #245857)\n- removed wrong patch to #150288\n[31:9.5.0a5-1]\n- updated to latest upstream\n[31:9.4.1-7]\n- marked caching-nameserver as obsolete (#244604)\n- fixed typo in initscript (causes that named doesn't detect NetworkManager\n correctly)\n- next cleanup in configuration - moved configfiles into config.tar\n- removed delay between start & stop in restart function in named.init\n[31:9.4.1-6]\n- major changes in initscript. Could be LSB compatible now\n- removed caching-nameserver subpackage. Move configs from this\n package to main bind package as default configuration and major\n configuration cleanup\n[31:9.4.1-5]\n- very minor compatibility change in bind-chroot-admin (line 215)\n- enabled IDN support by default and don't distribute IDN libraries\n- specfile cleanup\n- add dynamic directory to /var/named. This directory will be primarily used for\n dynamic DNS zones. ENABLE_ZONE_WRITE and SELinux's named_write_master_zones no longer exist\n[31:9.4.1-4]\n- removed ldap-api patch and start using deprecated API\n- fixed minor problem in bind-chroot-admin script (#241103)\n[31:9.4.1-3]\n- fixed bind-chroot-admin dynamic DNS handling (#239149)\n- updated zone-freeze patch to latest upstream\n- ldap sdb has been rewriten to latest api (#239802)\n[31:9.4.1-2.fc7]\n- test build on new build system\n[31:9.4.1-1.fc7]\n- updated to 9.4.1 which contains fix to CVE-2007-2241\n[31:9.4.0-8.fc7]\n- improved 'zone freeze patch' - if multiple zone with same name exists\n no zone is freezed\n- minor cleanup in caching-nameserver's config file\n- fixed race-condition in dbus code (#235809)\n- added forgotten restorecon statement in bind-chroot-admin\n[31:9.4.0-7.fc7]\n- removed DEBUGINFO option because with this option (default) was bind\n builded with -O0 and without this flag no debuginfo package was produced.\n (I want faster bind => -O2 + debuginfo)\n- fixed zone finding (#236426)\n[31:9.4.0-6.fc7]\n- added idn support (still under development with upstream, disabled by default)\n[31:9.4.0-5.fc7]\n- dnssec-signzone utility now doesn't ignore -d parameter\n[31:9.4.0-4.fc7]\n- removed query-source[-v6] options from caching-nameserver config\n (#209954, increase security)\n- throw away idn. It won't be ready in fc7\n[31:9.4.0-3.fc7]\n- prepared bind to merge review\n- added experimental idn support to bind-utils utils (not enabled by default yet)\n- change chroot policy in caching-nameserver post section\n- fixed bug in bind-chroot-admin - rootdir function is called properly now\n[31:9.4.0-2.fc7]\n- added experimental SQLite support (written by John Boyd \n)\n- moved bind-chroot-admin script to chroot package\n- bind-9.3.2-redhat_doc.patch is always applied (#231738)\n[31:9.4.0-1.fc7]\n- updated to 9.4.0\n- bind-chroot-admin now sets EAs correctly (#213926)\n- throw away next_server_on_referral and no_servfail_stops patches (fixed in 9.4.0)\n[31:9.3.4-7.fc7]\n- minor cleanup in bind-chroot-admin script\n[31:9.3.4-6.fc7]\n- fixed broken bind-chroot-admin script (#227995)\n[31:9.3.4-5.fc7]\n- bind-chroot-admin now uses correct chroot path (#227600)\n[31:9.3.4-4.fc7]\n- fixed conflict between bind-sdb and ldap\n- removed duplicated bind directory in bind-libs\n[31:9.3.4-3.fc7]\n- fixed building without libbind\n- fixed post section (selinux commands is now in if-endif statement)\n- prever macro has been removed from version\n[31:9.3.4-2.fc7]\n- redirected output from bind-chroot prep and %preun stages to /dev/null\n[31:9.3.4-1.fc7]\n- updated to version 9.3.4 which contains security bugfixes\n[31:9.3.3-5.fc7]\n- package bind-libbind-devel has been marked as obsolete\n[31:9.3.3-4.fc7]\n- package bind-libbind-devel has beed removed (libs has been moved to bind-devel & bind-libs)\n- Resolves: #214208\n[31:9.3.3-3]\n- fixed a multi-lib issue\n- Resolves: rhbz#222717\n[31:9.3.3-2]\n- added namedGetForwarders written in shell (#176100),\n created by Baris Cicek \n.\n[31:9.3.3-1]\n- update to 9.3.3 final\n- fix for #219069: file included twice in src.rpm\n[31:9.3.3-0.1.rc3]\n- added back an interval to restart\n- renamed package, it should meet the N-V-R criteria\n- fix for #216185: bind-chroot-admin able to change root mode 750\n- added fix from #215997: incorrect permissions on dnszone.schema\n- added a notice to init script when /etc/named.conf doesn't exist (#216075)\n[30:9.3.3-6]\n- fix for #200465: named-checkzone and co. cannot be run as non-root user\n- fix for #212348: chroot'd named causes df permission denied error\n- fix for #211249, #211083 - problems with stopping named\n- fix for #212549: init script does not unmount /proc filesystem\n- fix for #211282: EDNS is globally enabled, crashing CheckPoint FW-1,\n added edns-enable options to named configuration file which can suppress\n EDNS in queries to DNS servers (see /usr/share/doc/bind-9.3.3/misc/options)\n- fix for #212961: bind-chroot doesn't clean up its mess on %preun\n- update to 9.3.3rc3, removed already merged patches\n[30:9.3.3-5]\n- fix for #209359: bind-libs from compatlayer CD will not\n install on ia64\n[30:9.3.3-4]\n- added fix for #210096: warning: group named does not exist - using root\n[30:9.3.3-3]\n- added fix from #209400 - Bind Init Script does not create\n the PID file always, created by Jeff Means\n- added timeout to stop section of init script.\n The default is 100 sec. and can be adjusted by NAMED_SHUTDOWN_TIMEOUT\n shell variable.\n[30:9.3.3-2]\n- removed chcon from %post script, replaced by restorecon\n (Bug 202547, comment no. 37)\n[30:9.3.3-1]\n- updated to the latest upstream (9.3.3rc2)\n[30:9.3.2-41]\n- added upstream patch for correct SIG handling - CVE-2006-4095\n[30:9.3.2-40]\n- suppressed messages from bind-chroot-admin\n- cleared notes about bind-config\n[30:9.3.2-39]\n- added fix for #203522 - 'bind-chroot-admin -e' command fails\n[30:9.3.2-38]\n- fix for #203194 - tmpfile usage\n[30:9.3.2-37]\n- fix for #202542 - /usr/sbin/bind-chroot-admin: No such file or directory\n- fix for #202547 - file_contexts: invalid context\n[30:9.3.2-36]\n- added Provides: bind-config\n[30:9.3.2-35]\n- fix bug 197493: renaming subpackage bind-config to caching-nameserver\n[30:9.3.2-34]\n- fix bug 199876: make '%exclude libbbind.*' conditional on %{LIBBIND}\n[30:9.3.2-33]\n- fix #195881, perms are not packaged correctly\n[30:9.3.2-32]\n- fix addenda to bug 189789:\n determination of selinux enabled was still not 100% correct in bind-chroot-admin\n- fix addenda to bug 196398:\n make named.init test for NetworkManager being enabled AFTER testing for -D absence;\n named.init now supports a 'DISABLE_NAMED_DBUS' /etc/sysconfig/named setting to disable\n auto-enable of named dbus support if NetworkManager enabled.\n[30:9.3.2-30]\n- fix bug 196398 - Enable -D option automatically in initscript\n if NetworkManager enabled in any runlevel.\n- fix namedGetForwarders for new dbus\n- fix bug 195881 - libbind.so should be owned by bind-libbind-devel\n[30:9.3.2-28.FC6]\n- Rebuild against new dbus\n[30:9.3.2-27.FC6]\n- rebuild with fixed glibc-kernheaders\n[30:9.3.2-26.FC6.1]\n- rebuild\n[30:9.3.2-26.FC6]\n- fix bugs 191093, 189789\n- backport selected fixes from upstream bind9 'v9_3_3b1' CVS version:\n ( see http://www.isc.org/sw/bind9.3.php 'Fixes' ):\n o change 2024 / bug 16027:\n named emitted spurious 'zone serial unchanged' messages on reload\n o change 2013 / bug 15941:\n handle unexpected TSIGs on unsigned AXFR/IXFR responses more gracefully\n o change 2009 / bug 15808: coverity fixes\n o change 1997 / bug 15818:\n named was failing to replace negative cache entries when a positive one\n for the type was learnt\n o change 1994 / bug 15694: OpenSSL 0.9.8 support\n o change 1991 / bug 15813:\n The configuration data, once read, should be treated as readonly.\n o misc. validator fixes\n o misc. resolver fixes\n o misc. dns fixes\n o misc. isc fixes\n o misc. libbind fixes\n o misc. isccfg fix\n o misc. lwres fix\n o misc. named fixes\n o misc. dig fixes\n o misc. nsupdate fix\n o misc. tests fixes\n[30:9.3.2-24.FC6]\n- and actually put the devel symlinks in the right subpackage\n[30:9.3.2-23.FC6]\n- rebuild for -devel deps\n[30:9.3.2-22]\n- apply upstream patch for ncache_adderesult segfault bug 173961 addenda\n- fix bug 188382: rpm --verify permissions inconsistencies\n- fix bug 189186: use /sbin/service instead of initscript\n- rebuild for new gcc, glibc-kernheaders\n[30:9.3.2-20]\n- fix resolver.c ncache_adderesult segfault reported in addenda to bug 173961\n (upstream bugs #15642, #15528 ?)\n- allow named ability to generate core dumps after setuid (upstream bug #15753)\n[30:9.3.2-18]\n- fix bug 187529: make bind-chroot-admin deal with subdirectories properly\n[30:9.3.2-16]\n- fix bug 187286:\n prevent host(1) printing duplicate 'is an alias for' messages\n for the default AAAA and MX lookups as well as for the A lookup\n (it now uses the CNAME returned for the A lookup for the AAAA and MX lookups).\n This is upstream bug #15702 fixed in the unreleased bind-9.3.3\n- fix bug 187333: fix SOURCE24 and SOURCE25 transposition\n[30:9.3.2-14]\n- fix bug 186577: remove -L/usr/lib from libbind.pc and more .spec file cleanup\n- add '%doc' sample configuration files in /usr/share/doc/bind*/sample\n- rebuild with new gcc and glibc\n[30:9.3.2-12]\n- fix typo in initscript\n- fix Requires(post): policycoreutils in sub-packages\n[30.9.3.2-10]\n- fix bug 185969: more .spec file cleanup\n[30.9.3.2-8]\n- Do not allow package to be installed if named:25 userid creation fails\n- Give libbind a pkg-config file\n- remove restorecon from bind-chroot-admin (not required).\n- fix named.caching-nameserver.conf (listen-on-v6 port 53 { ::1 };)\n[30:9.3.2-7]\n- fix issues with bind-chroot-admin\n[30:9.3.2-6]\n- replace caching-nameserver with bind-config sub-package\n- fix bug 177595: handle case where is a link in initscript\n- fix bug 177001: bind-config creates symlinks OK now\n- fix bug 176388: named.conf is now never replaced by any RPM\n- fix bug 176248: remove unecessary creation of rpmsave links\n- fix bug 174925: no replacement of named.conf\n- fix bug 173963: existing named.conf never modified\n- major .spec file cleanup\n[30:9.3.2-4.1]\n- bump again for double-long bug on ppc(64)\n[30:9.3.2-4]\n- regenerate redhat_doc patch for non-DBUS builds\n- allow dbus builds to work with dbus version < 0.6 (bz #179816)\n[30:9.3.2-3]\n- try supporting without dbus support\n[30:9.3.2-2.1]\n- Rebuild for new gcc, glibc, glibc-kernheaders\n[30:9.3.2-2]\n- fix bug 177854: temporary fix for broken kernel-2.6.15-1854+\n /proc/net/if_inet6 format\n[30:9.3.2-1]\n- Upgrade to 9.3.2, released today\n[28:9.3.2rc1-2]\n- fix bug 176100: do not Require: perl just for namedGetForwarders !\n* Fri Dec 09 2005 Jesse Keating \n- rebuilt\n[28:9.3.2rc-1]\n- Upgrade to upstream version 9.3.2rc1\n- fix namedSetForwarders -> namedGetForwarders SOURCE14 typo\n[24:9.3.1-26]\n- rebuild for new dbus 0.6 dependency; remove use of\n DBUS_NAME_FLAG_PROHIBIT_REPLACEMENT\n[24:9.3.1-24]\n- allow D-BUS support to work in bind-chroot environment:\n workaround latest selinux policy by mounting /var/run/dbus/\n under chroot instead of /var/run/dbus/system-bus-socket\n[24:9.3.1-22]\n- fix bug 172632 - remove .la files\n- ship namedGetForwarders and namedSetForwarders scripts\n- fix detection of -D option in chroot\n[24:9.3.1-21]\n- rebuilt with new openssl\n[24.9.3.1-20]\n- Allow the -D enable D-BUS option to be used within bind-chroot .\n- fix bug 171226: supply some documentation for pgsql SDB .\n[24:9.3.1-18]\n- fix bug 169969: do NOT call dbus_svc_dispatch() in dbus_mgr_init_dbus() -\n task->state != task_ready and will cause Abort in task.c if process\n is waiting for NameOwnerChanged to do a SetForwarders\n[24:9.3.1-16]\n- Fix reconnecting to dbus-daemon after it stops & restarts .\n[24:9.3.1-14]\n- When forwarder nameservers are changed with D-BUS, flush the cache.\n[24:9.3.1-12]\n- fix bug 168302: use %{__cc} for compiling dns-keygen\n- fix bug 167682: bind-chroot directory permissions\n- fix issues with -D dbus option when dbus service not running or disabled\n[24:9.3.1-12]\n- fix bug 167062: named should be started after syslogd by default\n[24:9.3.1-11]\n- fix bug 166227: host: don't do default AAAA and MX lookups with '-t a' option\n[24:9.3.1-10]\n- Build with D-BUS patch by default; D-BUS support enabled with named -D option\n- Enable D-BUS for named_sdb also\n- fix sdb pgsql's zonetodb.c: must use isc_hash_create() before dns_db_create()\n- update fix for bug 160914 : test for RD=1 and ARCOUNT=0 also before trying next server\n- fix named.init script to handle named_sdb properly\n- fix named.init script checkconfig() to handle named '-c' option\n and make configtest, test, check configcheck synonyms\n[24:9.3.1-8]\n- fix named.init script bugs 163598, 163409, 151852(addendum)\n[24:9.3.1-7]\n- fix bug 160914: resolver utilities should try next server on empty referral\n (now that glibc bug 162625 is fixed)\n host and nslookup now by default try next server on SERVFAIL\n (host now has '-s' option to disable, and nslookup given\n '[no]fail' option similar to dig's [no]fail option).\n- rebuild and re-test with new glibc & gcc (all tests passed).\n[24:9.3.1-6]\n- fix bug 157950: dig / host / nslookup should reject invalid resolv.conf\n files and not use uninitialized garbage nameserver values\n (ISC bug 14841 raised).\n[24:9.3.1-4_FC4]\n- Fix SDB LDAP\n[24:9.3.1-4]\n- Fix bug 157601: give named.init a configtest function\n- Fix bug 156797: named.init should check SELinux booleans.local before booleans\n- Fix bug 154335: if no controls in named.conf, stop named with -TERM sig, not rndc\n- Fix bug 155848: add NOTES section to named.8 man-page with info on all Red Hat\n BIND quirks and SELinux DDNS / slave zone file configuration\n- D-BUS patches NOT applied until dhcdbd is in FC\n[24:9.3.1-4_dbus]\n- Enhancement to allow dynamic forwarder table management and\n- DHCP forwarder auto-configuration with D-BUS\n[24:9.3.1-2_FC4]\n- Rebuild for bind-sdb libpq.so.3 dependency\n- fix bug 150981: don't install libbind man-pages if no libbind\n- fix bug 151852: mount proc on /proc to allow sysconf(...)\n to work and correct number of CPUs to be determined\n[24:9.3.1-1_FC4]\n- Upgrade to ISC BIND 9.3.1 (final release) released today.\n[22.9.3.1rc1-5]\n- fix bug 150288: h_errno not being accessed / set correctly in libbind\n- add libbind man-pages from bind-8.4.6\n[22:9.3.1rc1-4]\n- Rebuild with gcc4 / glibc-2.3.4-14.\n[22:9.3.1rc1-3]\n- configure with --with-pic to get PIC libraries\n[22:9.3.1rc1-2]\n- fix bug 149183: don't use getifaddrs() .\n[22:9.3.1rc1-1]\n- Upgrade to 9.3.1rc1\n- Add Simplified Database Backend (SDB) sub-package ( bind-sdb )\n- add named_sdb - ldap + pgsql + dir database backend support with\n- 'ENABLE_SDB' named.sysconfig option\n- Add BIND resolver library & includes sub-package ( libbind-devel)\n- fix bug 147824 / 147073 / 145664: ENABLE_ZONE_WRITE in named.init\n- fix bug 146084 : shutup restorecon\n[22:9.3.0-2]\n- Fix bug 143438: named.init will now make correct ownership of /var/named\n- based on 'named_write_master_zones' SELinux boolean.\n- Fix bug 143744: dig & nsupdate IPv6 timeout (dup of 140528)\n[9.3.0-1]\n- Upgrade BIND to 9.3.0 in Rawhide / FC4 (bugs 134529, 133654...)\n[20:9.2.4-4]\n- Fix bugs 140528 and 141113:\n- 2 second timeouts when IPv6 not configured and root nameserver's\n- AAAA addresses are queried\n[20:9.2.4-2]\n- Fix bug 136243: bind-chroot %post must run restorecon -R /var/named/chroot\n- Fix bug 135175: named.init must return non-zero if named is not run\n- Fix bug 134060: bind-chroot %post must use mktemp, not /tmp/named\n- Fix bug 133423: bind-chroot %files entries should have been %dirs\n[20:9.2.4-1]\n- BIND 9.2.4 (final release) released - source code actually\n- identical to 9.2.4rc8, with only version number change.\n[10:9.2.4rc8-14]\n- Upgrade to upstream bind-9.2.4rc8 .\n- Progress: Finally! Hooray! ISC bind now distributes:\n- o named.conf(5) and nslookup(8) manpages\n- 'bind-manpages.bz2' source can now disappear\n- (could this have something to do with ISC bug I raised about this?)\n- o 'deprecation_msg' global has vanished\n- bind-9.2.3rc3-deprecation_msg_shut_up.diff.bz2 can disappear\n[10:9.2.4rc8-14]\n- Fix bug 106572/132385: copy /etc/localtime to chroot on start\n[10:9.2.4rc7-12_EL3]\n- Fix bug 132303: if ROOTDIR line was replaced after upgrade from\n- bind-chroot-9.2.2-21, restart named\n[10:9.2.4rc7-11_EL3]\n- Fix bug 131803: replace ROOTDIR line removed by broken\n- bind-chroot 9.2.2-21's '%postun'; added %triggerpostun for bind-chroot\n[10:9.2.4rc7-10_EL3]\n- Fix bugs 130121 & 130981 for RHEL-3\n[10:9.2.4rc7-10]\n- Fix bug 130121: add '%ghost' entries for files included in previous\n- bind-chroot & not in current - ie. named.conf, rndc.key, dev/* -\n- that RPM removed after upgrade .\n* Thu Aug 26 2004 Jason Vas Dias \n- Fix bug 130981: add '-t' option to named-checkconf invocation in\n- named.init if chroot installed.\n* Wed Aug 25 2004 Jason Vas Dias \n- Remove resolver(5) manpage now in man-pages (bug 130792);\n- Don't create /dev/ entries in bind-chroot if already there (bug 127556);\n- fix bind-devel Requires (bug 130919)\n- Set default location for dumpdb & stats files to /var/named/data\n* Tue Aug 24 2004 Jason Vas Dias \n- Fix devel Requires for bug 130738 & fix version\n* Tue Aug 24 2004 Jason Vas Dias \n- Fix errors on clean install if named group does not exist\n- (bug 130777)\n* Thu Aug 19 2004 Jason Vas Dias \n- Upgrade to bind-9.2.4rc7; applied initscript fix\n- for bug 102035.\n* Mon Aug 09 2004 Jason Vas Dias \n- Fixed bug 129289: bind-chroot install / deinstall\n- on install, existing config files 'safe_replace'd\n- with links to chroot copies; on uninstall, moved back.\n* Fri Aug 06 2004 Jason Vas Dias \n- Fixed bug 129258: '/var/tmp' typo in spec\n* Wed Jul 28 2004 Jason Vas Dias \n- Fixed bug 127124 : 'Requires: kernel >= 2.4'\n- causes problems with Linux VServers\n* Tue Jul 27 2004 Jason Vas Dias \n- Fixed bug 127555 : chroot tar missing var/named/slaves\n* Fri Jul 16 2004 Jason Vas Dias \n- Upgraded to ISC version 9.2.4rc6\n* Fri Jul 16 2004 Jason Vas Dias \n- Fixed named.init generation of error messages on\n- 'service named stop' and 'service named reload'\n- as per bug 127775\n[9.2.3-19]\n- Bump for rhel 3.0 U3\n[9.2.3-18]\n- remove disable-linux-caps\n[9.2.3-17]\n- Update RHEL3 to latest bind\n* Tue Jun 15 2004 Elliot Lee \n- rebuilt\n[9.2.3-15]\n- Remove device files from chroot, Named uses the system one\n[9.2.3-14]\n- Move RFC to devel package\n[9.2.3-13]\n- Fix location of restorecon\n[9.2.3-12]\n- Tighten security on config files. Should be owned by root\n[9.2.3-11]\n- Update key patch to include conf-keygen\n[9.2.3-10]\n- fix chroot to only happen once.\n- fix init script to do kill insteall of killall\n[9.2.3-9]\n- Add fix for SELinux security context\n* Tue Mar 02 2004 Elliot Lee \n- rebuilt\n* Sat Feb 28 2004 Florian La Roche \n- run ldconfig for libs subrpm\n* Mon Feb 23 2004 Tim Waugh \n- Use ':' instead of '.' as separator for chown.\n[9.2.3-7]\n- Add COPYRIGHT\n* Fri Feb 13 2004 Elliot Lee \n- rebuilt\n[9.2.3-5]\n- Add defattr to libs\n[9.2.3-4]\n- Break out library package\n[9.2.3-3]\n- Fix condrestart\n[9.2.3-2]\n- Move libisc and libdns to bind from bind-util\n[9.2.3-1]\n- Move to 9.2.3\n[9.2.2.P3-10]\n- Add PIE support\n[9.2.2.P3-9]\n- Add /var/named/slaves directory\n* Sun Oct 12 2003 Florian La Roche \n- do not link against libnsl, not needed for Linux\n[9.2.2.P3-6]\n- Fix local time in log file\n[9.2.2.P3-5]\n- Try again\n[9.2.2.P3-4]\n- Fix handling of chroot -/dev/random\n[9.2.2.P3-3]\n- Stop hammering stuff on update of chroot environment\n[9.2.2.P3-2]\n- Fix chroot directory to grab all subdirectories\n[9.2.2.P3-1]\n- New patch to support for 'delegation-only'\n[9.2.2-23]\n- patch support for 'delegation-only'\n[9.2.2-22]\n- Update to build on RHL\n[9.2.2-21]\n- Install libraries as exec so debug info will be pulled\n[9.2.2-20]\n- Remove BSDCOMPAT (BZ 99454)\n[9.2.2-19]\n- Update to build on RHL\n[9.2.2-18]\n- Change protections on /var/named and /var/chroot/named\n[9.2.2-17]\n- Update to build on RHL\n[9.2.2-16]\n- Update to build on RHEL\n* Wed Jun 04 2003 Elliot Lee \n- rebuilt\n[9.2.2-14]\n- Update to build on RHEL\n[9.2.2-13]\n- Fix config description of named.conf in chroot\n- Change named.init script to check for existence of /etc/sysconfig/network\n[9.2.2-12]\n- Update to build on RHEL\n[9.2.2-11]\n- Update to build on RHEL\n[9.2.2-10]\n- Fix echo OK on starting/stopping service\n[9.2.2-9]\n- Update to build on RHEL\n[9.2.2-8]\n- Fix echo on startup\n[9.2.2-7]\n- Fix problems with chroot environment\n- Eliminate posix threads\n[9.2.2-6]\n- Fix build problems\n[9.2.2-5]\n- Fix build on beehive\n[9.2.2-4]\n- build bind-chroot kit\n[9.2.2-3]\n- Change configure to use proper threads model\n[9.2.2-2]\n- update to 9.2.2\n[9.2.2-1]\n- update to 9.2.2\n[9.2.1-16]\n- Put a sleep in restart to make sure stop completes\n* Wed Jan 22 2003 Tim Powers \n- rebuilt\n[9.2.1-14]\n- Separate /etc/rndc.key to separate file\n[9.2.1-13]\n- Use openssl's pkgconfig data, if available, at build-time.\n[9.2.1-12]\n- Fix log rotate to use service named reload\n- Change service named reload to give success/failure message [73770]\n- Fix File checking [75710]\n- Begin change to automatically run in CHROOT environment\n[9.2.1-10]\n- Fix startup script to work like all others.\n[9.2.1-9]\n- Fix configure to build on x86_64 platforms\n* Wed Aug 07 2002 Karsten Hopp \n- fix #70583, doesn't build on IA64\n[9.2.1-8]\n- bind-utils shouldn't require bind\n[9.2.1-7]\n- fix name of pidfine in logrotate script (#68842)\n- fix owner of logfile in logrotate script (#41391)\n- fix nslookup and named.conf man pages (output on stderr)\n (#63553, #63560, #63561, #54889, #57457)\n- add rfc1912 (#50005)\n- gzip all rfc's\n- fix typo in keygen.c (#54870)\n- added missing manpages (#64065)\n- shutdown named properly with rndc stop (#62492)\n- /sbin/nologin instead of /bin/false (#68607)\n- move nsupdate to bind-utils (where the manpage already was) (#66209, #66381)\n- don't kill initscript when rndc fails (reload) (#58750)\n[9.2.1-5]\n- Fix #65975\n* Fri Jun 21 2002 Tim Powers \n- automated rebuild\n* Thu May 23 2002 Tim Powers \n- automated rebuild\n[9.2.1-2]\n- Move libisccc, lib isccfg and liblwres from bind-utils to bind,\n they're not required if you aren't running a nameserver.\n* Fri May 03 2002 Florian La Roche \n- update to 9.2.1 release\n[9.2.0-8]\n- Merge 30+ bug fixes from 9.2.1rc1 code\n[9.2.0-7]\n- Don't exit if /etc/named.conf doesn't exist if we're running\n chroot (#60868)\n- Revert Elliot's changes, we do require specific glibc/glibc-kernheaders\n versions or bug #58335 will be back. 'It compiles, therefore it works'\n isn't always true.\n[9.2.0-6]\n- Fix BuildRequires (we don't need specific glibc/glibc-kernheaders\nversions).\n- Use _smp_mflags\n[9.2.0-4]\n- rebuild, require recent autoconf, automake (#58335)\n* Fri Jan 25 2002 Tim Powers \n- rebuild against new libssl\n* Wed Jan 09 2002 Tim Powers \n- automated rebuild\n[9.2.0-1]\n- 9.2.0\n[9.2.0-0.rc10.2]\n- 9.2.0rc10\n[9.2.0-0.rc8.2]\n- Fix up rndc.conf (#55574)\n[9.2.0-0.rc8.1]\n- rc8\n- Enforce --enable-threads\n[9.2.0-0.rc7.1]\n- 9.2.0rc7\n- Use rndc status for 'service named status', it's supposed to actually\n work in 9.2.x.\n[9.2.0-0.rc5.1]\n- 9.2.0rc5\n- Fix rpm --rebuild with ancient libtool versions (#53938, #54257)\n[9.2.0-0.rc4.1]\n- 9.2.0rc4\n[9.2.0-0.rc3.1]\n- 9.2.0rc3\n- remove ttl patch, I don't think we need this for 8.0.\n- remove dig.1.bz2 from the bind8-manpages tar file, 9.2 has a new dig man page\n- add lwres* man pages to -devel\n[9.1.3-4]\n- Make sure /etc/rndc.conf isn't world-readable even after the\n %post script inserted a random key (#53009)\n[9.1.3-3]\n- Add build dependencies (#49368)\n- Make sure running service named start several times doesn't create\n useless processes (#47596)\n- Work around the named parent process returning 0 even if the config\n file is broken (it's parsed later by the child processes) (#45484)\n[9.1.3-2]\n- Don't use rndc status, it's not yet implemented (#48839)\n* Sun Jul 08 2001 Florian La Roche \n- update to 9.1.3 release\n[9.1.3-0.rc3.1]\n- Fix up rndc configuration and improve security (#46586)\n[9.1.3-0.rc2.2]\n- Sync with caching-nameserver-7.1-6\n[9.1.3-0.rc2.1]\n- Update to rc2\n[9.1.3-0.rc1.3]\n- Remove resolv.conf(5) man page, it's now in man-pages\n[9.1.3-0.rc1.2]\n- Add named.conf man page from bind 8.x (outdated, but better than nothing,\n - Rename the rndc key (#42895)\n- Add dnssec* man pages\n[9.1.3-0.rc1.1]\n- 9.1.3rc1\n- s/Copyright/License/\n[9.1.2-1]\n- 9.1.2 final. No changes between 9.1.2-0.rc1.1 and this one, except for\n the version number, though.\n[9.1.2-0.rc1.1]\n- 9.1.2rc1\n[9.1.1-1]\n- 9.1.1\n[9.1.0-10]\n- Merge fixes from 9.1.1rc5\n[9.1.0-9]\n- Work around bind 8 -> bind 9 migration problem when using buggy zone files:\n accept zones without a TTL, but spew out a big fat warning. (#31393)\n* Thu Mar 08 2001 Bernhard Rosenkraenzer \n- Add fixes from rc4\n* Fri Mar 02 2001 Nalin Dahyabhai \n- rebuild in new environment\n* Thu Mar 01 2001 Bernhard Rosenkraenzer \n- killall -HUP named if rndc reload fails (#30113)\n* Tue Feb 27 2001 Bernhard Rosenkraenzer \n- Merge some fixes from 9.1.1rc3\n* Tue Feb 20 2001 Bernhard Rosenkraenzer \n- Don't use the standard rndc key from the documentation, instead, create a random one\n at installation time (#26358)\n- Make /etc/rndc.conf readable by user named only, it contains secret keys\n* Tue Feb 20 2001 Bernhard Rosenkraenzer \n- 9.1.1 probably won't be out in time, revert to 9.1.0 and apply fixes\n from 9.1.1rc2\n- bind requires bind-utils (#28317)\n* Tue Feb 13 2001 Bernhard Rosenkraenzer \n- Update to rc2, fixes 2 more bugs\n- Fix build with glibc >= 2.2.1-7\n* Thu Feb 08 2001 Bernhard Rosenkraenzer \n- Update to 9.1.1rc1; fixes 17 bugs (14 of them affecting us;\n 1 was fixed in a Red Hat patch already, 2 others are portability\n improvements)\n* Wed Feb 07 2001 Bernhard Rosenkraenzer \n- Remove initscripts 5.54 requirement (#26489)\n* Mon Jan 29 2001 Bernhard Rosenkraenzer \n- Add named-checkconf, named-checkzone (#25170)\n* Mon Jan 29 2001 Trond Eivind Glomsrod \n- use echo, not gprintf\n* Wed Jan 24 2001 Bernhard Rosenkraenzer \n- Fix problems with \n Patch from Daniel Roesen \n Bug #24890\n* Thu Jan 18 2001 Bernhard Rosenkraenzer \n- 9.1.0 final\n* Sat Jan 13 2001 Bernhard Rosenkraenzer \n- 9.1.0rc1\n- i18nify init script\n- bzip2 source to save space\n* Thu Jan 11 2001 Bernhard Rosenkraenzer \n- Fix %postun script\n* Tue Jan 09 2001 Bernhard Rosenkraenzer \n- 9.1.0b3\n* Mon Jan 08 2001 Bernhard Rosenkraenzer \n- Add named.conf man page from bind8 (#23503)\n* Sun Jan 07 2001 Bernhard Rosenkraenzer \n- Make /etc/rndc.conf and /etc/sysconfig/named noreplace\n- Make devel require bind = %{version} rather than just bind\n* Sun Jan 07 2001 Bernhard Rosenkraenzer \n- Fix init script for real\n* Sat Jan 06 2001 Bernhard Rosenkraenzer \n- Fix init script when ROOTDIR is not set\n* Thu Jan 04 2001 Bernhard Rosenkraenzer \n- Add hooks for setting up named to run chroot (RFE #23246)\n- Fix up requirements\n* Fri Dec 29 2000 Bernhard Rosenkraenzer \n- 9.1.0b2\n* Wed Dec 20 2000 Bernhard Rosenkraenzer \n- Move run files to /var/run/named/ - /var/run isn't writable\n by the user we're running as. (Bug #20665)\n* Tue Dec 19 2000 Bernhard Rosenkraenzer \n- Fix reverse lookups (#22272)\n- Run ldconfig in %post utils\n* Tue Dec 12 2000 Karsten Hopp \n- fixed logrotate script (wrong path to kill)\n- include header files in -devel package\n- bugzilla #22049, #19147, 21606\n* Fri Dec 08 2000 Bernhard Rosenkraenzer \n- 9.1.0b1 (9.1.0 is in our timeframe and less buggy)\n* Mon Nov 13 2000 Bernhard Rosenkraenzer \n- 9.0.1\n* Mon Oct 30 2000 Bernhard Rosenkraenzer \n- Fix initscript (Bug #19956)\n- Add sample rndc.conf (Bug #19956)\n- Fix build with tar 1.13.18\n* Tue Oct 10 2000 Bernhard Rosenkraenzer \n- Add some missing man pages (taken from bind8) (Bug #18794)\n* Sun Sep 17 2000 Bernhard Rosenkraenzer \n- 9.0.0 final\n* Wed Aug 30 2000 Bernhard Rosenkraenzer \n- rc5\n- fix up nslookup\n* Thu Aug 24 2000 Bernhard Rosenkraenzer \n- rc4\n* Thu Jul 13 2000 Bernhard Rosenkraenzer \n- 9.0.0rc1\n* Wed Jul 12 2000 Prospector \n- automatic rebuild\n* Sun Jul 09 2000 Florian La Roche \n- add 'exit 0' for uninstall case\n* Fri Jul 07 2000 Florian La Roche \n- add prereq init.d and cleanup install section\n* Fri Jun 30 2000 Trond Eivind Glomsrod \n- fix the init script\n* Wed Jun 28 2000 Nalin Dahyabhai \n- make libbind.a and nslookup.help readable again by setting INSTALL_LIB to ''\n* Mon Jun 26 2000 Bernhard Rosenkranzer \n- Fix up the initscript (Bug #13033)\n- Fix build with current glibc (Bug #12755)\n- /etc/rc.d/init.d -> /etc/init.d\n- use %{_mandir} rather than /usr/share/man\n* Mon Jun 19 2000 Bill Nottingham \n- fix conflict with man-pages\n- remove compatibilty chkconfig links\n- initscript munging\n* Wed Jun 14 2000 Nalin Dahyabhai \n- modify logrotate setup to use PID file\n- temporarily disable optimization by unsetting at build-time\n- actually bump the release this time\n* Sun Jun 04 2000 Bernhard Rosenkraenzer \n- FHS compliance\n* Mon Apr 17 2000 Nalin Dahyabhai \n- clean up restart patch\n* Mon Apr 10 2000 Nalin Dahyabhai \n- provide /var/named (fix for bugs #9847, #10205)\n- preserve args when restarted via ndc(8) (bug #10227)\n- make resolv.conf(5) a link to resolver(5) (bug #10245)\n- fix SYSTYPE bug in all makefiles\n- move creation of named user from %post into %pre\n* Mon Feb 28 2000 Bernhard Rosenkranzer \n- Fix TTL (patch from ISC, Bug #9820)\n* Wed Feb 16 2000 Bernhard Rosenkranzer \n- fix typo in spec (it's %post, without a leading blank) introduced in -6\n- change SYSTYPE to linux\n* Fri Feb 11 2000 Bill Nottingham \n- pick a standard < 100 uid/gid for named\n* Fri Feb 04 2000 Elliot Lee \n- Pass named a '-u named' parameter by default, and add/remove user.\n* Thu Feb 03 2000 Bernhard Rosenkraenzer \n- fix host mx bug (Bug #9021)\n* Mon Jan 31 2000 Cristian Gafton \n- rebuild to fix dependencies\n- man pages are compressed\n* Wed Jan 19 2000 Bernhard Rosenkraenzer \n- It's /usr/bin/killall, not /usr/sbin/killall (Bug #8063)\n* Mon Jan 17 2000 Bernhard Rosenkraenzer \n- Fix up location of named-bootconf.pl and make it executable\n (Bug #8028)\n- bind-devel requires bind\n* Mon Nov 15 1999 Bernhard Rosenkraenzer \n- update to 8.2.2-P5\n* Wed Nov 10 1999 Bill Nottingham \n- update to 8.2.2-P3\n* Tue Oct 12 1999 Cristian Gafton \n- add patch to stop a cache only server from complaining about lame servers\n on every request.\n* Fri Sep 24 1999 Preston Brown \n- use real stop and start in named.init for restart, not ndc restart, it has\n problems when named has changed during a package update... (# 4890)\n* Fri Sep 10 1999 Bill Nottingham \n- chkconfig --del in %preun, not %postun\n* Mon Aug 16 1999 Bill Nottingham \n- initscript munging\n* Mon Jul 26 1999 Bill Nottingham \n- fix installed chkconfig links to match init file\n* Sat Jul 03 1999 Jeff Johnson \n- conflict with new (in man-1.24) man pages (#3876,#3877).\n* Tue Jun 29 1999 Bill Nottingham \n- fix named.logrotate (wrong %SOURCE)\n* Fri Jun 25 1999 Jeff Johnson \n- update to 8.2.1.\n- add named.logrotate (#3571).\n- hack around egcs-1.1.2 -m486 bug (#3413, #3485).\n- vet file list.\n* Fri Jun 18 1999 Bill Nottingham \n- don't run by default\n* Sun May 30 1999 Jeff Johnson \n- nslookup fixes (#2463).\n- missing files (#3152).\n* Sat May 01 1999 Stepan Kasal \n- nslookup patched:\n to count numRecords properly\n to fix subsequent calls to ls -d\n to parse 'view' and 'finger' commands properly\n the view hack updated for bind-8 (using sed)\n* Wed Mar 31 1999 Bill Nottingham \n- add ISC patch\n- add quick hack to make host not crash\n- add more docs\n* Fri Mar 26 1999 Cristian Gafton \n- add probing information in the init file to keep linuxconf happy\n- dont strip libbind\n* Sun Mar 21 1999 Cristian Gafton \n- auto rebuild in the new build environment (release 3)\n* Wed Mar 17 1999 Preston Brown \n- removed 'done' output at named shutdown.\n* Tue Mar 16 1999 Cristian Gafton \n- version 8.2\n* Wed Dec 30 1998 Cristian Gafton \n- patch to use the __FDS_BITS macro\n- build for glibc 2.1\n* Wed Sep 23 1998 Jeff Johnson \n- change named.restart to /usr/sbin/ndc restart\n* Sat Sep 19 1998 Jeff Johnson \n- install man pages correctly.\n- change K10named to K45named.\n* Wed Aug 12 1998 Jeff Johnson \n- don't start if /etc/named.conf doesn't exist.\n* Sat Aug 08 1998 Jeff Johnson \n- autmagically create /etc/named.conf from /etc/named.boot in %post\n- remove echo in %post\n* Wed Jun 10 1998 Jeff Johnson \n- merge in 5.1 mods\n* Sun Apr 12 1998 Manuel J. Galan \n- Several essential modifications to build and install correctly.\n- Modified 'ndc' to avoid deprecated use of '-'\n* Mon Dec 22 1997 Scott Lampert \n- Used buildroot\n- patched bin/named/ns_udp.c to use \n for include\n on Redhat 5.0 instead of ", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "baseScore": 8.6, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 4.0}, "published": "2022-02-03T00:00:00", "type": "oraclelinux", "title": "bind security update", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2006-4095", "CVE-2007-2241", "CVE-2007-2925", "CVE-2007-2926", "CVE-2007-6283", "CVE-2008-0122", "CVE-2008-1447", "CVE-2009-0025", "CVE-2009-0696", "CVE-2010-0097", "CVE-2010-0290", "CVE-2011-0414", "CVE-2011-1910", "CVE-2011-2464", "CVE-2012-1033", "CVE-2012-1667", "CVE-2012-3817", "CVE-2012-4244", "CVE-2012-5166", "CVE-2012-5688", "CVE-2012-5689", "CVE-2013-2266", "CVE-2013-4854", "CVE-2014-0591", "CVE-2014-8500", "CVE-2015-1349", "CVE-2015-4620", "CVE-2015-5477", "CVE-2015-5722", "CVE-2015-8000", "CVE-2015-8704", "CVE-2016-1285", "CVE-2016-1286", "CVE-2016-2776", "CVE-2016-2848", "CVE-2016-8864", "CVE-2016-9147", "CVE-2017-3136", "CVE-2017-3137", "CVE-2017-3142", "CVE-2017-3143", "CVE-2017-3145", "CVE-2018-5740", "CVE-2018-5741", "CVE-2018-5743", "CVE-2020-8616", "CVE-2020-8617", "CVE-2020-8622", "CVE-2020-8625", "CVE-2021-25215"], "modified": "2022-02-03T00:00:00", "id": "ELSA-2022-9117", "href": "http://linux.oracle.com/errata/ELSA-2022-9117.html", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "ubuntu": [{"lastseen": "2022-01-04T13:01:11", "description": "It was discovered that Bind incorrectly handled certain crafted queries \nwhen DNS64 was enabled. A remote attacker could use this flaw to cause Bind \nto crash, resulting in a denial of service.\n", "cvss3": {}, "published": "2012-12-06T00:00:00", "type": "ubuntu", "title": "Bind vulnerability", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "COMPLETE", "integrityImpact": "NONE", "baseScore": 7.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 6.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2012-5688"], "modified": "2012-12-06T00:00:00", "id": "USN-1657-1", "href": "https://ubuntu.com/security/notices/USN-1657-1", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}], "debiancve": [{"lastseen": "2022-06-04T05:56:55", "description": "ISC BIND 9.8.x before 9.8.4-P1 and 9.9.x before 9.9.2-P1, when DNS64 is enabled, allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a crafted query.", "cvss3": {}, "published": "2012-12-06T11:45:00", "type": "debiancve", "title": "CVE-2012-5688", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "COMPLETE", "integrityImpact": "NONE", "baseScore": 7.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2012-5688"], "modified": "2012-12-06T11:45:00", "id": "DEBIANCVE:CVE-2012-5688", "href": "https://security-tracker.debian.org/tracker/CVE-2012-5688", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}], "amazon": [{"lastseen": "2021-07-25T19:34:04", "description": "**Issue Overview:**\n\nA flaw was found in the DNS64 implementation in BIND. If a remote attacker sent a specially-crafted query to a named server, named could exit unexpectedly with an assertion failure. Note that DNS64 support is not enabled by default. (CVE-2012-5688)\n\n \n**Affected Packages:** \n\n\nbind\n\n \n**Issue Correction:** \nRun _yum update bind_ to update your system.\n\n \n\n\n**New Packages:**\n \n \n i686: \n \u00a0\u00a0\u00a0 bind-chroot-9.8.2-0.10.rc1.26.amzn1.i686 \n \u00a0\u00a0\u00a0 bind-devel-9.8.2-0.10.rc1.26.amzn1.i686 \n \u00a0\u00a0\u00a0 bind-sdb-9.8.2-0.10.rc1.26.amzn1.i686 \n \u00a0\u00a0\u00a0 bind-utils-9.8.2-0.10.rc1.26.amzn1.i686 \n \u00a0\u00a0\u00a0 bind-9.8.2-0.10.rc1.26.amzn1.i686 \n \u00a0\u00a0\u00a0 bind-libs-9.8.2-0.10.rc1.26.amzn1.i686 \n \u00a0\u00a0\u00a0 bind-debuginfo-9.8.2-0.10.rc1.26.amzn1.i686 \n \n src: \n \u00a0\u00a0\u00a0 bind-9.8.2-0.10.rc1.26.amzn1.src \n \n x86_64: \n \u00a0\u00a0\u00a0 bind-debuginfo-9.8.2-0.10.rc1.26.amzn1.x86_64 \n \u00a0\u00a0\u00a0 bind-sdb-9.8.2-0.10.rc1.26.amzn1.x86_64 \n \u00a0\u00a0\u00a0 bind-libs-9.8.2-0.10.rc1.26.amzn1.x86_64 \n \u00a0\u00a0\u00a0 bind-chroot-9.8.2-0.10.rc1.26.amzn1.x86_64 \n \u00a0\u00a0\u00a0 bind-utils-9.8.2-0.10.rc1.26.amzn1.x86_64 \n \u00a0\u00a0\u00a0 bind-devel-9.8.2-0.10.rc1.26.amzn1.x86_64 \n \u00a0\u00a0\u00a0 bind-9.8.2-0.10.rc1.26.amzn1.x86_64 \n \n \n", "edition": 2, "cvss3": {}, "published": "2012-12-07T09:28:00", "type": "amazon", "title": "Important: bind", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "COMPLETE", "integrityImpact": "NONE", "baseScore": 7.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 6.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2012-5688"], "modified": "2014-09-14T17:19:00", "id": "ALAS-2012-146", "href": "https://alas.aws.amazon.com/ALAS-2012-146.html", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}], "fedora": [{"lastseen": "2020-12-21T08:17:51", "description": "BIND (Berkeley Internet Name Domain) is an implementation of the DNS (Domain Name System) protocols. BIND includes a DNS server (named), which resolves host names to IP addresses; a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating properly. ", "cvss3": {}, "published": "2012-12-10T07:10:53", "type": "fedora", "title": "[SECURITY] Fedora 18 Update: bind-9.9.2-5.P1.fc18", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "COMPLETE", "integrityImpact": "NONE", "baseScore": 7.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 6.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2012-5688"], "modified": "2012-12-10T07:10:53", "id": "FEDORA:1EF0120940", "href": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/ZCGXUWQTL3WBBD6M2DEZ62UCMNPWOBCL/", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2020-12-21T08:17:51", "description": "BIND (Berkeley Internet Name Domain) is an implementation of the DNS (Domain Name System) protocols. BIND includes a DNS server (named), which resolves host names to IP addresses; a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating properly. ", "cvss3": {}, "published": "2012-12-13T05:50:23", "type": "fedora", "title": "[SECURITY] Fedora 17 Update: bind-9.9.2-3.P1.fc17", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "COMPLETE", "integrityImpact": "NONE", "baseScore": 8.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 7.8, "obtainUserPrivilege": false}, "cvelist": ["CVE-2012-1667", "CVE-2012-5688"], "modified": "2012-12-13T05:50:23", "id": "FEDORA:853AA20DE7", "href": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/O6EU4Y6XW5D5P3LAIXAS7OME7VAQCMWN/", "cvss": {"score": 8.5, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:C"}}, {"lastseen": "2020-12-21T08:17:51", "description": "BIND (Berkeley Internet Name Domain) is an implementation of the DNS (Domain Name System) protocols. BIND includes a DNS server (named), which resolves host names to IP addresses; a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating properly. ", "cvss3": {}, "published": "2012-12-29T06:29:14", "type": "fedora", "title": "[SECURITY] Fedora 16 Update: bind-9.8.4-3.P1.fc16", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "COMPLETE", "integrityImpact": "NONE", "baseScore": 8.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 7.8, "obtainUserPrivilege": false}, "cvelist": ["CVE-2011-4313", "CVE-2012-1667", "CVE-2012-5688"], "modified": "2012-12-29T06:29:14", "id": "FEDORA:7144920A56", "href": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/FLU2HBSOUPQBPRO3USDJYVGLCNCXUSSN/", "cvss": {"score": 8.5, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:C"}}], "redhat": [{"lastseen": "2021-10-19T18:38:58", "description": "The Berkeley Internet Name Domain (BIND) is an implementation of the Domain\nName System (DNS) protocols. BIND includes a DNS server (named); a resolver\nlibrary (routines for applications to use when interfacing with DNS); and\ntools for verifying that the DNS server is operating correctly. DNS64 is\nused to automatically generate DNS records so IPv6 based clients can access\nIPv4 systems through a NAT64 server.\n\nA flaw was found in the DNS64 implementation in BIND. If a remote attacker\nsent a specially-crafted query to a named server, named could exit\nunexpectedly with an assertion failure. Note that DNS64 support is not\nenabled by default. (CVE-2012-5688)\n\nUsers of bind are advised to upgrade to these updated packages, which\ncorrect this issue. After installing the update, the BIND daemon (named)\nwill be restarted automatically.\n", "cvss3": {}, "published": "2012-12-06T00:00:00", "type": "redhat", "title": "(RHSA-2012:1549) Important: bind security update", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "COMPLETE", "integrityImpact": "NONE", "baseScore": 7.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 6.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2012-5688"], "modified": "2018-06-06T16:24:23", "id": "RHSA-2012:1549", "href": "https://access.redhat.com/errata/RHSA-2012:1549", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}], "seebug": [{"lastseen": "2017-11-19T17:48:21", "description": "BUGTRAQ ID: 56817\r\nCVE(CAN) ID: CVE-2012-5688\r\n\r\nBIND\u662f\u4e00\u4e2a\u5e94\u7528\u975e\u5e38\u5e7f\u6cdb\u7684DNS\u534f\u8bae\u7684\u5b9e\u73b0\u3002\r\n\r\nISC BIND 9.8.0\u53ca\u66f4\u9ad8\u7248\u672c\u652f\u6301 DNS64 IPv6\u8f6c\u6362\u673a\u5236\uff0c\u5982\u679c\u542f\u7528\u4e86dns64\u914d\u7f6e\u72b6\u6001\uff0cBIND 9\u57df\u540d\u670d\u52a1\u5668\u5728\u89e3\u6790\u7279\u5236\u7684\u8bf7\u6c42\u65f6\uff0c\u4f1a\u89e6\u53d1REQUIRE\u65ad\u8a00\u5931\u8d25\uff0c\u9020\u6210\u670d\u52a1\u5668\u5d29\u6e83\u3002\u6b64\u6f0f\u6d1e\u53ef\u88ab\u8fdc\u7a0b\u5229\u7528\uff0c9.8.0\u4e4b\u524d\u7248\u672c\u3001\u4e0d\u542f\u7528DNS64\u65f6\u4e0d\u53d7\u6b64\u6f0f\u6d1e\u7684\u5f71\u54cd\u3002\n0\nISC BIND 9.9.0->9.9.2\r\nISC BIND 9.8.0->9.8.4\n\u4e34\u65f6\u89e3\u51b3\u65b9\u6cd5\uff1a\r\n\r\n\u5bf9\u4e8e\u542f\u7528\u4e86DNS64\u7684BIND 9\u670d\u52a1\u5668\uff0c\u7981\u6b62\u63a5\u53d7\u6765\u81ea\u53ef\u7591\u5ba2\u6237\u7aef\u7684\u8bf7\u6c42\u3002\u6216\u8005\u7981\u7528DNS64\u3001\u5347\u7ea7\u5230\u5df2\u4fee\u590d\u8865\u4e01\u7684\u7248\u672c\u3002\r\n\r\n\u5382\u5546\u8865\u4e01\uff1a\r\n\r\nISC\r\n---\r\nISC\u5df2\u7ecf\u4e3a\u6b64\u53d1\u5e03\u4e86\u4e00\u4e2a\u5b89\u5168\u516c\u544a\uff08AA-00828\uff09\u4ee5\u53ca\u76f8\u5e94\u8865\u4e01:\r\n\r\nAA-00828\uff1aCVE-2012-5688: BIND 9 servers using DNS64 can be crashed by a crafted query\r\n\r\n\u94fe\u63a5\uff1ahttps://kb.isc.org/article/AA-00828\r\n\r\n\u8865\u4e01\u4e0b\u8f7d\uff1ahttp://www.isc.org/downloads/all.\r\n\r\nBIND 9 version 9.8.4-P1\r\nBIND 9 version 9.9.2-P1", "cvss3": {}, "published": "2012-12-11T00:00:00", "title": "ISC BIND 9 DNS64 REQUIRE\u65ad\u8a00\u5931\u8d25\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e", "type": "seebug", "bulletinFamily": "exploit", "cvss2": {}, "cvelist": ["CVE-2012-5688"], "modified": "2012-12-11T00:00:00", "href": "https://www.seebug.org/vuldb/ssvid-60500", "id": "SSV:60500", "sourceData": "", "sourceHref": "", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}], "securityvulns": [{"lastseen": "2018-08-31T11:09:49", "description": "Crash on malcrafted request processing if DNS64 option is enabled.", "edition": 1, "cvss3": {}, "published": "2012-12-06T00:00:00", "title": "ISC bind DoS", "type": "securityvulns", "bulletinFamily": "software", "cvss2": {}, "cvelist": ["CVE-2012-5688"], "modified": "2012-12-06T00:00:00", "id": "SECURITYVULNS:VULN:12742", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:12742", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2018-08-31T11:10:49", "description": "\r\n\r\n-----BEGIN PGP SIGNED MESSAGE-----\r\nHash: SHA1\r\n\r\nAPPLE-SA-2013-09-12-1 OS X Mountain Lion v10.8.5 and Security Update\r\n2013-004\r\n\r\nOS X Mountain Lion v10.8.5 and Security Update 2013-004 is now\r\navailable and addresses the following:\r\n\r\nApache\r\nAvailable for: Mac OS X 10.6.8, Mac OS X Server 10.6.8,\r\nOS X Lion v10.7.5, OS X Lion Server v10.7.5,\r\nOS X Mountain Lion v10.8 to v10.8.4\r\nImpact: Multiple vulnerabilities in Apache\r\nDescription: Multiple vulnerabilities existed in Apache, the most\r\nserious of which may lead to cross-site scripting. These issues were\r\naddressed by updating Apache to version 2.2.24.\r\nCVE-ID\r\nCVE-2012-0883\r\nCVE-2012-2687\r\nCVE-2012-3499\r\nCVE-2012-4558\r\n\r\nBind\r\nAvailable for: OS X Lion v10.7.5, OS X Lion Server v10.7.5,\r\nOS X Mountain Lion v10.8 to v10.8.4\r\nImpact: Multiple vulnerabilities in BIND\r\nDescription: Multiple vulnerabilities existed in BIND, the most\r\nserious of which may lead to a denial of service. These issues were\r\naddressed by updating BIND to version 9.8.5-P1. CVE-2012-5688 did not\r\naffect Mac OS X v10.7 systems.\r\nCVE-ID\r\nCVE-2012-3817\r\nCVE-2012-4244\r\nCVE-2012-5166\r\nCVE-2012-5688\r\nCVE-2013-2266\r\n\r\nCertificate Trust Policy\r\nAvailable for: Mac OS X 10.6.8, Mac OS X Server 10.6.8,\r\nOS X Lion v10.7.5, OS X Lion Server v10.7.5,\r\nOS X Mountain Lion v10.8 to v10.8.4\r\nImpact: Root certificates have been updated\r\nDescription: Several certificates were added to or removed from the\r\nlist of system roots. The complete list of recognized system roots\r\nmay be viewed via the Keychain Access application.\r\n\r\nClamAV\r\nAvailable for: Mac OS X 10.6.8, Mac OS X Server 10.6.8,\r\nOS X Lion v10.7.5, OS X Lion Server v10.7.5\r\nImpact: Multiple vulnerabilities in ClamAV\r\nDescription: Multiple vulnerabilities exist in ClamAV, the most\r\nserious of which may lead to arbitrary code execution. This update\r\naddresses the issues by updating ClamAV to version 0.97.8.\r\nCVE-ID\r\nCVE-2013-2020\r\nCVE-2013-2021\r\n\r\nCoreGraphics\r\nAvailable for: OS X Mountain Lion v10.8 to v10.8.4\r\nImpact: Viewing a maliciously crafted PDF file may lead to an\r\nunexpected application termination or arbitrary code execution\r\nDescription: A buffer overflow existed in the handling of JBIG2\r\nencoded data in PDF files. This issue was addressed through\r\nadditional bounds checking.\r\nCVE-ID\r\nCVE-2013-1025 : Felix Groebert of the Google Security Team\r\n\r\nImageIO\r\nAvailable for: OS X Mountain Lion v10.8 to v10.8.4\r\nImpact: Viewing a maliciously crafted PDF file may lead to an\r\nunexpected application termination or arbitrary code execution\r\nDescription: A buffer overflow existed in the handling of JPEG2000\r\nencoded data in PDF files. This issue was addressed through\r\nadditional bounds checking.\r\nCVE-ID\r\nCVE-2013-1026 : Felix Groebert of the Google Security Team\r\n\r\nInstaller\r\nAvailable for: OS X Lion v10.7.5, OS X Lion Server v10.7.5,\r\nOS X Mountain Lion v10.8 to v10.8.4\r\nImpact: Packages could be opened after certificate revocation\r\nDescription: When Installer encountered a revoked certificate, it\r\nwould present a dialog with an option to continue. The issue was\r\naddressed by removing the dialog and refusing any revoked package.\r\nCVE-ID\r\nCVE-2013-1027\r\n\r\nIPSec\r\nAvailable for: Mac OS X 10.6.8, Mac OS X Server 10.6.8,\r\nOS X Lion v10.7.5, OS X Lion Server v10.7.5,\r\nOS X Mountain Lion v10.8 to v10.8.4\r\nImpact: An attacker may intercept data protected with IPSec Hybrid\r\nAuth\r\nDescription: The DNS name of an IPSec Hybrid Auth server was not\r\nbeing matched against the certificate, allowing an attacker with a\r\ncertificate for any server to impersonate any other. This issue was\r\naddressed by properly checking the certificate.\r\nCVE-ID\r\nCVE-2013-1028 : Alexander Traud of www.traud.de\r\n\r\nKernel\r\nAvailable for: OS X Mountain Lion v10.8 to v10.8.4\r\nImpact: A local network user may cause a denial of service\r\nDescription: An incorrect check in the IGMP packet parsing code in\r\nthe kernel allowed a user who could send IGMP packets to the system\r\nto cause a kernel panic. The issue was addressed by removing the\r\ncheck.\r\nCVE-ID\r\nCVE-2013-1029 : Christopher Bohn of PROTECTSTAR INC.\r\n\r\nMobile Device Management\r\nAvailable for: OS X Lion v10.7.5, OS X Lion Server v10.7.5,\r\nOS X Mountain Lion v10.8 to v10.8.4\r\nImpact: Passwords may be disclosed to other local users\r\nDescription: A password was passed on the command-line to mdmclient,\r\nwhich made it visible to other users on the same system. The issue\r\nwas addressed by communicating the password through a pipe.\r\nCVE-ID\r\nCVE-2013-1030 : Per Olofsson at the University of Gothenburg\r\n\r\nOpenSSL\r\nAvailable for: Mac OS X 10.6.8, Mac OS X Server 10.6.8,\r\nOS X Lion v10.7.5, OS X Lion Server v10.7.5,\r\nOS X Mountain Lion v10.8 to v10.8.4\r\nImpact: Multiple vulnerabilities in OpenSSL\r\nDescription: Multiple vulnerabilities existed in OpenSSL, the most\r\nserious of which may lead to disclosure of user data. These issues\r\nwere addressed by updating OpenSSL to version 0.9.8y.\r\nCVE-ID\r\nCVE-2012-2686\r\nCVE-2013-0166\r\nCVE-2013-0169\r\n\r\nPHP\r\nAvailable for: Mac OS X 10.6.8, Mac OS X Server 10.6.8,\r\nOS X Lion v10.7.5, OS X Lion Server v10.7.5,\r\nOS X Mountain Lion v10.8 to v10.8.4\r\nImpact: Multiple vulnerabilities in PHP\r\nDescription: Multiple vulnerabilities existed in PHP, the most\r\nserious of which may lead to arbitrary code execution. These issues\r\nwere addressed by updating PHP to version 5.3.26.\r\nCVE-ID\r\nCVE-2013-1635\r\nCVE-2013-1643\r\nCVE-2013-1824\r\nCVE-2013-2110\r\n\r\nPostgreSQL\r\nAvailable for: OS X Lion v10.7.5, OS X Lion Server v10.7.5,\r\nOS X Mountain Lion v10.8 to v10.8.4\r\nImpact: Multiple vulnerabilities in PostgreSQL\r\nDescription: Multiple vulnerabilities exist in PostgreSQL, the most\r\nserious of which may lead to data corruption or privilege escalation.\r\nThis update addresses the issues by updating PostgreSQL to version\r\n9.0.13.\r\nCVE-ID\r\nCVE-2013-1899\r\nCVE-2013-1900\r\nCVE-2013-1901\r\nCVE-2013-1902\r\nCVE-2013-1903\r\n\r\nPower Management\r\nAvailable for: OS X Mountain Lion v10.8 to v10.8.4\r\nImpact: The screen saver may not start after the specified time\r\nperiod\r\nDescription: A power assertion lock issue existed. This issue was\r\naddressed through improved lock handling.\r\nCVE-ID\r\nCVE-2013-1031\r\n\r\nQuickTime\r\nAvailable for: Mac OS X 10.6.8, Mac OS X Server 10.6.8,\r\nOS X Lion v10.7.5, OS X Lion Server v10.7.5,\r\nOS X Mountain Lion v10.8 to v10.8.4\r\nImpact: Viewing a maliciously crafted movie file may lead to an\r\nunexpected application termination or arbitrary code execution\r\nDescription: A memory corruption issue existed in the handling of\r\n'idsc' atoms in QuickTime movie files. This issue was addressed\r\nthrough additional bounds checking.\r\nCVE-ID\r\nCVE-2013-1032 : Jason Kratzer working with iDefense VCP\r\n\r\nScreen Lock\r\nAvailable for: OS X Mountain Lion v10.8 to v10.8.4\r\nImpact: A user with screen sharing access may be able to bypass the\r\nscreen lock when another user is logged in\r\nDescription: A session management issue existed in the screen lock's\r\nhandling of screen sharing sessions. This issue was addressed through\r\nimproved session tracking.\r\nCVE-ID\r\nCVE-2013-1033 : Jeff Grisso of Atos IT Solutions, Sebastien Stormacq\r\n\r\nNote: OS X Mountain Lion v10.8.5 also addresses an issue where\r\ncertain Unicode strings could cause applications to unexpectedly\r\nterminate.\r\n\r\n\r\nOS X Mountain Lion v10.8.5 and Security Update 2013-004 may be\r\nobtained from the Software Update pane in System Preferences,\r\nor Apple's Software Downloads web site:\r\nhttp://www.apple.com/support/downloads/\r\n\r\nThe Software Update utility will present the update that applies\r\nto your system configuration. Only one is needed, either\r\nOS X Mountain Lion v10.8.5, or Security Update\r\n2013-004.\r\n\r\nFor OS X Mountain Lion v10.8.4\r\nThe download file is named: OSXUpd10.8.5.dmg\r\nIts SHA-1 digest is: a74ab6d9501778437e7afba0bbed47b776a52b11\r\n\r\nFor OS X Mountain Lion v10.8 and v10.8.3\r\nThe download file is named: OSXUpdCombo10.8.5.dmg\r\nIts SHA-1 digest is: cb798ac9b97ceb2d8875af040ce4ff06187d61f2\r\n\r\nFor OS X Lion v10.7.5\r\nThe download file is named: SecUpd2013-004.dmg\r\nIts SHA-1 digest is: dbc50fce7070f83b93b866a21b8f5c6e65007fa0\r\n\r\nFor OS X Lion Server v10.7.5\r\nThe download file is named: SecUpdSrvr2013-004.dmg\r\nIts SHA-1 digest is: 44a77edbd37732b865bc21a9aac443a3cdc47355\r\n\r\nFor Mac OS X v10.6.8\r\nThe download file is named: SecUpd2013-004.dmg\r\nIts SHA-1 digest is: d07d5142a2549270f0d2eaddb262b41bb5c16b61\r\n\r\nFor Mac OS X Server v10.6.8\r\nThe download file is named: SecUpdSrvr2013-004.dmg\r\nIts SHA-1 digest is: 8f9abe93f7f9427cf86b89bd67df948a85537dbc\r\n\r\nInformation will also be posted to the Apple Security Updates\r\nweb site: http://support.apple.com/kb/HT1222\r\n\r\nThis message is signed with Apple's Product Security PGP key,\r\nand details are available at:\r\nhttps://www.apple.com/support/security/pgp/\r\n\r\n-----BEGIN PGP SIGNATURE-----\r\nVersion: GnuPG/MacGPG2 v2.0.17 (Darwin)\r\nComment: GPGTools - http://gpgtools.org\r\n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\r\nvBrJ5gm+nnyRe2TUMAwz\r\n=h9hc\r\n-----END PGP SIGNATURE-----\r\n\r\n", "edition": 1, "cvss3": {}, "published": "2013-10-03T00:00:00", "title": "APPLE-SA-2013-09-12-1 OS X Mountain Lion v10.8.5 and Security Update 2013-004", "type": "securityvulns", "bulletinFamily": "software", "cvss2": {}, "cvelist": ["CVE-2013-0166", "CVE-2013-1028", "CVE-2013-2266", "CVE-2012-4558", "CVE-2013-0169", "CVE-2013-1903", "CVE-2013-1643", "CVE-2013-2110", "CVE-2013-1026", "CVE-2012-2687", "CVE-2012-2686", "CVE-2012-0883", "CVE-2013-1032", "CVE-2013-1025", "CVE-2012-3817", "CVE-2013-2020", "CVE-2012-5688", "CVE-2013-1824", "CVE-2012-5166", "CVE-2013-1033", "CVE-2012-4244", "CVE-2013-1030", "CVE-2013-1901", "CVE-2013-1902", "CVE-2012-3499", "CVE-2013-1635", "CVE-2013-1029", "CVE-2013-1031", "CVE-2013-1900", "CVE-2013-2021", "CVE-2013-1899", "CVE-2013-1027"], "modified": "2013-10-03T00:00:00", "id": "SECURITYVULNS:DOC:29893", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:29893", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "centos": [{"lastseen": "2022-02-27T11:55:12", "description": "**CentOS Errata and Security Advisory** CESA-2012:1549\n\n\nThe Berkeley Internet Name Domain (BIND) is an implementation of the Domain\nName System (DNS) protocols. BIND includes a DNS server (named); a resolver\nlibrary (routines for applications to use when interfacing with DNS); and\ntools for verifying that the DNS server is operating correctly. DNS64 is\nused to automatically generate DNS records so IPv6 based clients can access\nIPv4 systems through a NAT64 server.\n\nA flaw was found in the DNS64 implementation in BIND. If a remote attacker\nsent a specially-crafted query to a named server, named could exit\nunexpectedly with an assertion failure. Note that DNS64 support is not\nenabled by default. (CVE-2012-5688)\n\nUsers of bind are advised to upgrade to these updated packages, which\ncorrect this issue. After installing the update, the BIND daemon (named)\nwill be restarted automatically.\n\n\n**Merged security bulletin from advisories:**\nhttps://lists.centos.org/pipermail/centos-announce/2012-December/055944.html\n\n**Affected packages:**\nbind\nbind-chroot\nbind-devel\nbind-libs\nbind-sdb\nbind-utils\n\n**Upstream details at:**\nhttps://access.redhat.com/errata/RHSA-2012:1549", "cvss3": {}, "published": "2012-12-06T22:45:49", "type": "centos", "title": "bind security update", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "COMPLETE", "integrityImpact": "NONE", "baseScore": 7.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 6.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2012-5688"], "modified": "2012-12-06T22:45:49", "id": "CESA-2012:1549", "href": "https://lists.centos.org/pipermail/centos-announce/2012-December/055944.html", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}], "freebsd": [{"lastseen": "2022-01-19T15:51:33", "description": "\n\nISC reports:\n\nBIND 9 nameservers using the DNS64 IPv6 transition mechanism are\n\t vulnerable to a software defect that allows a crafted query to\n\t crash the server with a REQUIRE assertion failure. Remote\n\t exploitation of this defect can be achieved without extensive\n\t effort, resulting in a denial-of-service (DoS) vector against\n\t affected servers.\n\n\n", "cvss3": {}, "published": "2012-11-27T00:00:00", "type": "freebsd", "title": "dns/bind9* -- servers using DNS64 can be crashed by a crafted query", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "COMPLETE", "integrityImpact": "NONE", "baseScore": 7.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 6.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2012-5688"], "modified": "2012-11-27T00:00:00", "id": "2892A8E2-3D68-11E2-8E01-0800273FE665", "href": "https://vuxml.freebsd.org/freebsd/2892a8e2-3d68-11e2-8e01-0800273fe665.html", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2022-01-19T15:51:33", "description": "\n\nProblem description:\n\nDue to a software defect a crafted query can cause named(8) to crash\n\t with an assertion failure.\n\n\n", "cvss3": {}, "published": "2013-02-19T00:00:00", "type": "freebsd", "title": "FreeBSD -- BIND remote DoS with deliberately crafted DNS64 query", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "COMPLETE", "integrityImpact": "NONE", "baseScore": 7.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 6.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2012-5688"], "modified": "2013-02-19T00:00:00", "id": "4671CDC9-7C6D-11E2-809B-6C626D99876C", "href": "https://vuxml.freebsd.org/freebsd/4671cdc9-7c6d-11e2-809b-6c626d99876c.html", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}], "cve": [{"lastseen": "2022-03-23T13:22:45", "description": "ISC BIND 9.8.x before 9.8.4-P1 and 9.9.x before 9.9.2-P1, when DNS64 is enabled, allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a crafted query.", "cvss3": {}, "published": "2012-12-06T11:45:00", "type": "cve", "title": "CVE-2012-5688", "cwe": ["CWE-20"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "COMPLETE", "integrityImpact": "NONE", "baseScore": 7.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2012-5688"], "modified": "2018-12-06T19:14:00", "cpe": ["cpe:/o:canonical:ubuntu_linux:12.10", "cpe:/a:isc:bind:9.9.1", "cpe:/o:canonical:ubuntu_linux:12.04", "cpe:/a:isc:bind:9.8.3", "cpe:/a:isc:bind:9.8.2", "cpe:/a:isc:bind:9.8.0", "cpe:/a:isc:bind:9.9.0", "cpe:/a:isc:bind:9.8.1"], "id": "CVE-2012-5688", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-5688", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}, "cpe23": ["cpe:2.3:a:isc:bind:9.8.1:b3:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.8.3:p3:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.9.1:p3:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.8.3:p2:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "cpe:2.3:a:isc:bind:9.9.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.9.0:a3:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.8.0:b1:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.9.1:p4:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.8.2:rc2:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.8.2:rc1:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.9.0:b1:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.8.2:b1:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.9.0:a1:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.8.0:p1:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.8.0:a1:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.8.3:-:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.9.1:p1:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.8.1:b1:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.8.1:b2:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.9.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.9.0:a2:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.9.1:-:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.8.3:p4:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.9.0:b2:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.9.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.8.0:p2:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.8.0:p4:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.8.1:rc1:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.8.1:p1:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.8.0:-:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.9.0:rc4:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.8.2:-:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.8.3:p1:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.8.0:rc1:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.9.0:-:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.8.1:-:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.9.1:p2:*:*:*:*:*:*"]}], "ubuntucve": [{"lastseen": "2021-11-22T21:54:23", "description": "ISC BIND 9.8.x before 9.8.4-P1 and 9.9.x before 9.9.2-P1, when DNS64 is\nenabled, allows remote attackers to cause a denial of service (assertion\nfailure and daemon exit) via a crafted query.\n\n#### Bugs\n\n * <http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=695192>\n\n\n#### Notes\n\nAuthor| Note \n---|--- \n[mdeslaur](<https://launchpad.net/~mdeslaur>) | only 9.8.x and higher\n", "cvss3": {}, "published": "2012-12-05T00:00:00", "type": "ubuntucve", "title": "CVE-2012-5688", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "COMPLETE", "integrityImpact": "NONE", "baseScore": 7.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 6.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2012-5688"], "modified": "2012-12-05T00:00:00", "id": "UB:CVE-2012-5688", "href": "https://ubuntu.com/security/CVE-2012-5688", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}], "slackware": [{"lastseen": "2021-07-28T14:46:25", "description": "New bind packages are available for Slackware 12.1, 12.2, 13.0, 13.1, 13.37,\n14.0, and -current to fix security issues.\n\n\nHere are the details from the Slackware 14.0 ChangeLog:\n\npatches/packages/bind-9.9.2_P1-i486-1_slack14.0.txz: Upgraded.\n IMPORTANT NOTE: This package updates BIND from 9.7.6_P4 to\n 9.8.4_P1 since the 9.7 series is no longer supported. It is\n possible that some changes may be required to your local\n configuration.\n This release addresses some denial-of-service and other bugs.\n For more information, see:\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5688\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5166\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3817\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1667\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3868\n (* Security fix *)\n\nWhere to find the new packages:\n\nThanks to the friendly folks at the OSU Open Source Lab\n(http://osuosl.org) for donating FTP and rsync hosting\nto the Slackware project! :-)\n\nAlso see the \"Get Slack\" section on http://slackware.com for\nadditional mirror sites near you.\n\nUpdated package for Slackware 12.1:\nftp://ftp.slackware.com/pub/slackware/slackware-12.1/patches/packages/bind-9.8.4_P1-i486-1_slack12.1.tgz\n\nUpdated package for Slackware 12.2:\nftp://ftp.slackware.com/pub/slackware/slackware-12.2/patches/packages/bind-9.8.4_P1-i486-1_slack12.2.tgz\n\nUpdated package for Slackware 13.0:\nftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/packages/bind-9.8.4_P1-i486-1_slack13.0.txz\n\nUpdated package for Slackware x86_64 13.0:\nftp://ftp.slackware.com/pub/slackware/slackware64-13.0/patches/packages/bind-9.8.4_P1-x86_64-1_slack13.0.txz\n\nUpdated package for Slackware 13.1:\nftp://ftp.slackware.com/pub/slackware/slackware-13.1/patches/packages/bind-9.8.4_P1-i486-1_slack13.1.txz\n\nUpdated package for Slackware x86_64 13.1:\nftp://ftp.slackware.com/pub/slackware/slackware64-13.1/patches/packages/bind-9.8.4_P1-x86_64-1_slack13.1.txz\n\nUpdated package for Slackware 13.37:\nftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/bind-9.8.4_P1-i486-1_slack13.37.txz\n\nUpdated package for Slackware x86_64 13.37:\nftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/bind-9.8.4_P1-x86_64-1_slack13.37.txz\n\nUpdated package for Slackware 14.0:\nftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/bind-9.9.2_P1-i486-1_slack14.0.txz\n\nUpdated package for Slackware x86_64 14.0:\nftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/bind-9.9.2_P1-x86_64-1_slack14.0.txz\n\nUpdated package for Slackware -current:\nftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/bind-9.9.2_P1-i486-1.txz\n\nUpdated package for Slackware x86_64 -current:\nftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/bind-9.9.2_P1-x86_64-1.txz\n\n\nMD5 signatures:\n\nSlackware 12.1 package:\n2df945fd92d480df98711992180cdd70 bind-9.8.4_P1-i486-1_slack12.1.tgz\n\nSlackware 12.2 package:\nddf762702befde00ab86cda1a5766bbd bind-9.8.4_P1-i486-1_slack12.2.tgz\n\nSlackware 13.0 package:\nb6c9a8f1262bd39db2dd77034f58e568 bind-9.8.4_P1-i486-1_slack13.0.txz\n\nSlackware x86_64 13.0 package:\nb35c20ad9778035c7e04ef2944375608 bind-9.8.4_P1-x86_64-1_slack13.0.txz\n\nSlackware 13.1 package:\na6b061aeb84003ea7b6ddcc157e0db65 bind-9.8.4_P1-i486-1_slack13.1.txz\n\nSlackware x86_64 13.1 package:\n54ee26b4924ab502eedfd024d83db20e bind-9.8.4_P1-x86_64-1_slack13.1.txz\n\nSlackware 13.37 package:\n04d40ede0a96160e79767bf995469773 bind-9.8.4_P1-i486-1_slack13.37.txz\n\nSlackware x86_64 13.37 package:\nf4635df06e3c0f62f035d00e15b0f5fb bind-9.8.4_P1-x86_64-1_slack13.37.txz\n\nSlackware 14.0 package:\n66612ea03941fc8ef5ef21409ecc6fe3 bind-9.9.2_P1-i486-1_slack14.0.txz\n\nSlackware x86_64 14.0 package:\n6f664fe7e955c0dbe806a63ad9212c00 bind-9.9.2_P1-x86_64-1_slack14.0.txz\n\nSlackware -current package:\n83bc10ca67bede66bf742a7d0ab6e628 n/bind-9.9.2_P1-i486-1.txz\n\nSlackware x86_64 -current package:\n4a539dd88ef3637eee56693c037a3dc8 n/bind-9.9.2_P1-x86_64-1.txz\n\n\nInstallation instructions:\n\nUpgrade the package as root:\n > upgradepkg bind-9.9.2_P1-i486-1_slack14.0.txz\n\nThen, restart the name server:\n\n > /etc/rc.d/rc.bind restart", "cvss3": {}, "published": "2012-12-07T03:50:45", "type": "slackware", "title": "[slackware-security] bind", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "COMPLETE", "integrityImpact": "NONE", "baseScore": 8.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 7.8, "obtainUserPrivilege": false}, "cvelist": ["CVE-2012-1667", "CVE-2012-3817", "CVE-2012-3868", "CVE-2012-5166", "CVE-2012-5688"], "modified": "2012-12-07T03:50:45", "id": "SSA-2012-341-01", "href": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2012&m=slackware-security.536004", "cvss": {"score": 8.5, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:C"}}], "threatpost": [{"lastseen": "2018-10-06T23:01:48", "description": "A new version of the BIND DNS server software is available, fixing six security vulnerabilities and a long list of other bugs. BIND 9.9.2-P1 is mainly a security update and most of the issues it fixes are crashes and not remote code execution flaws.\n\nBIND is the overwhelming leader in market share for DNS servers and is used in millions of deployments around the world. The software is maintained by the Internet Systems Consortium and can be an attractive target for attackers looking for a way to get a privileged position in a given network. Name servers, such as those run on BIND software, handle the task of resolving queries for specific domain names into the IP addresses associated with them.\n\n[BIND 9.9.2-P1](<https://kb.isc.org/article/AA-00829>) includes a significant number of non-security changes, including fixes for more than 20 bugs. Here is the list of the security fixes included in the latest version of BIND:\n\n * Prevents named from aborting with a require assertion failure on servers with DNS64 enabled. These crashes might occur as a result of specific queries that are received. (Note that this fix is a subset of a series of updates that will be included in full in BIND 9.8.5 and 9.9.3 as change #3388, RT #30996). [CVE-2012-5688] [RT #30792]\n * A deliberately constructed combination of records could cause named to hang while populating the additional section of a response. [CVE-2012-5166] [RT #31090]\n * Prevents a named assert (crash) when queried for a record whose RDATA exceeds 65535 bytes. [CVE-2012-4244] [RT #30416]\n * Prevents a named assert (crash) when validating caused by using \u201cBad cache\u201d data before it has been initialized. [CVE-2012-3817] [RT #30025] \n\n * A condition has been corrected where improper handling of zero-length RDATA could cause undesirable behavior, including termination of the named process. [CVE-2012-1667] [RT #29644]\n * ISC_QUEUE handling for recursive clients was updated to address a race condition that could cause a memory leak. This rarely occurred with UDP clients, but could be a significant problem for a server handling a steady rate of TCP queries. [CVE-2012-3868] [RT #29539 & #30233]\n\nThe newest version of BIND also includes some new security related features, most notably the inclusion of support for Elliptic Curve Digital Signature Algorithm keys and signatures in DNSSEC. The [DNSSEC](<http://www.rfc-archive.org/getrfc.php?rfc=4033>) extension is designed to add an additional layer of integrity and origin authentication for DNS servers. \n", "cvss3": {}, "published": "2012-12-05T16:15:32", "type": "threatpost", "title": "Six Security Flaws Fixed in BIND 9.9.2", "bulletinFamily": "info", "cvss2": {}, "cvelist": ["CVE-2012-1667", "CVE-2012-3817", "CVE-2012-3868", "CVE-2012-4244", "CVE-2012-5166", "CVE-2012-5688"], "modified": "2013-04-17T16:31:08", "id": "THREATPOST:4550F15F5FA9CB180F8CFF266DA58A03", "href": "https://threatpost.com/six-security-flaws-fixed-bind-992-120512/77281/", "cvss": {"score": 8.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:NONE/A:COMPLETE/"}}], "gentoo": [{"lastseen": "2022-01-17T19:09:22", "description": "### Background\n\nBIND is the Berkeley Internet Name Domain Server.\n\n### Description\n\nMultiple vulnerabilities have been discovered in BIND. Please review the CVE identifiers referenced below for details. \n\n### Impact\n\nA remote attacker may be able to cause a Denial of Service condition.\n\n### Workaround\n\nThere is no known workaround at this time.\n\n### Resolution\n\nAll BIND users should upgrade to the latest version:\n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=net-dns/bind-9.9.4_p2\"", "cvss3": {}, "published": "2014-01-29T00:00:00", "type": "gentoo", "title": "BIND: Denial of service", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "COMPLETE", "integrityImpact": "NONE", "baseScore": 7.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2012-5166", "CVE-2012-5688", "CVE-2012-5689", "CVE-2013-2266", "CVE-2013-3919", "CVE-2013-4854", "CVE-2014-0591"], "modified": "2014-01-29T00:00:00", "id": "GLSA-201401-34", "href": "https://security.gentoo.org/glsa/201401-34", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}]}