Computer Security
[EN] securityvulns.ru no-pyccku


ISC bind named DNS server DoS
updated since 06.07.2011
Published:09.07.2011
Source:
SecurityVulns ID:11761
Type:remote
Threat Level:
7/10
Description:Crash on request processing.
Affected:ISC : bind 9.6
 ISC : bind 9.7
 BIND : bind 9.8
CVE:CVE-2011-2465 (Unspecified vulnerability in ISC BIND 9 9.8.0, 9.8.0-P1, 9.8.0-P2, and 9.8.1b1, when recursion is enabled and the Response Policy Zone (RPZ) contains DNAME or certain CNAME records, allows remote attackers to cause a denial of service (named daemon crash) via an unspecified query.)
 CVE-2011-2464 (Unspecified vulnerability in ISC BIND 9 9.6.x before 9.6-ESV-R4-P3, 9.7.x before 9.7.3-P3, and 9.8.x before 9.8.0-P4 allows remote attackers to cause a denial of service (named daemon crash) via a crafted UPDATE request.)
Original documentdocumentISC, Security Advisory: CVE-2011-2465 ISC BIND 9 Remote Crash with Certain RPZ Configurations (09.07.2011)
 documentISC, Security Advisory: CVE-2011-2464 - ISC BIND 9 Remote packet Denial of Service against Authoritative and Recursive Servers (09.07.2011)
 documentUBUNTU, [USN-1163-1] Bind vulnerability (06.07.2011)

foobar2000 integer overflow
Published:09.07.2011
Source:
SecurityVulns ID:11772
Type:local
Threat Level:
4/10
Description:Integer overflow on WAV parsing.
Affected:FOOBAR2000 : foobar2000 1.1
Original documentdocumentLuigi Auriemma, Integer overflow in foobar2000 1.1.7 (09.07.2011)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod