FreshPorts - VuXML

This page displays vulnerability information about FreeBSD Ports.

The last vuln.xml file processed by FreshPorts is:

Revision:  368362
Date:      2014-09-17
Time:      11:04:33Z
Committer: kwm

List all Vulnerabilities, by package

List all Vulnerabilities, by date

These are the vulnerabilities relating to the commit you have selected:

VuXML IDDescription
0bc67930-d5c3-11e1-bef6-0024e81297aedns/bind9* -- Heavy DNSSEC Validation Load Can Cause a 'Bad Cache' Assertion Failure

ISC reports:

High numbers of queries with DNSSEC validation enabled can cause an assertion failure in named, caused by using a 'bad cache' data structure before it has been initialized.

BIND 9 stores a cache of query names that are known to be failing due to misconfigured name servers or a broken chain of trust. Under high query loads when DNSSEC validation is active, it is possible for a condition to arise in which data from this cache of failing queries could be used before it was fully initialized, triggering an assertion failure.

This bug cannot be encountered unless your server is doing DNSSEC validation.


Discovery 2012-07-24
Entry 2012-07-24
bind99
lt 9.9.1.2

bind98
lt 9.8.3.2

bind97
lt 9.7.6.2

bind96
lt 9.6.3.1.ESV.R7.2

CVE-2012-3817
https://kb.isc.org/article/AA-00729
cb252f01-7c43-11e3-b0a6-005056a37f68bind -- denial of service vulnerability

ISC reports:

Because of a defect in handling queries for NSEC3-signed zones, BIND can crash with an "INSIST" failure in name.c when processing queries possessing certain properties. By exploiting this defect an attacker deliberately constructing a query with the right properties could achieve denial of service against an authoritative nameserver serving NSEC3-signed zones.


Discovery 2014-01-08
Entry 2014-01-13
Modified 2014-04-30
bind99
lt 9.9.4.2

bind99-base
lt 9.9.4.2

bind98
lt 9.8.6.2

bind98-base
lt 9.8.6.2

bind96
lt 9.6.3.2.ESV.R10.2

bind96-base
lt 9.6.3.2.ESV.R10.2

FreeBSD
gt 9.2 lt 9.2_3

gt 9.1 lt 9.1_10

gt 8.4 lt 8.4_7

gt 8.3 lt 8.3_14

CVE-2014-0591
SA-13:07.bind
https://kb.isc.org/article/AA-01078/74/
53a0ddef-0208-11e2-8afa-0024e830109bdns/bind9* -- Several vulnerabilities

ISC reports:

Prevents a crash when queried for a record whose RDATA exceeds 65535 bytes.

Prevents a crash when validating caused by using "Bad cache" data before it has been initialized.

ISC_QUEUE handling for recursive clients was updated to address a race condition that could cause a memory leak. This rarely occurred with UDP clients, but could be a significant problem for a server handling a steady rate of TCP queries.

A condition has been corrected where improper handling of zero-length RDATA could cause undesirable behavior, including termination of the named process.


Discovery 2012-09-12
Entry 2012-09-18
bind99
lt 9.9.1.3

bind98
lt 9.8.3.3

bind97
lt 9.7.6.3

bind96
lt 9.6.3.1.ESV.R7.3


57a700f9-12c0-11e2-9f86-001d923933b6dns/bind9* -- crash on deliberately constructed combination of records

ISC reports:

A deliberately constructed combination of records could cause named to hang while populating the additional section of a response.


Discovery 2012-09-26
Entry 2012-10-10
bind99
lt 9.9.1.4

bind98
lt 9.8.3.4

bind97
lt 9.7.6.4

bind96
lt 9.6.3.1.ESV.R7.4

CVE-2012-5166
57a700f9-12c0-11e2-9f86-001d923933b6dns/bind9* -- crash on deliberately constructed combination of records

ISC reports:

A deliberately constructed combination of records could cause named to hang while populating the additional section of a response.


Discovery 2012-09-26
Entry 2012-10-10
bind99
lt 9.9.1.4

bind98
lt 9.8.3.4

bind97
lt 9.7.6.4

bind96
lt 9.6.3.1.ESV.R7.4

CVE-2012-5166
0bc67930-d5c3-11e1-bef6-0024e81297aedns/bind9* -- Heavy DNSSEC Validation Load Can Cause a 'Bad Cache' Assertion Failure

ISC reports:

High numbers of queries with DNSSEC validation enabled can cause an assertion failure in named, caused by using a 'bad cache' data structure before it has been initialized.

BIND 9 stores a cache of query names that are known to be failing due to misconfigured name servers or a broken chain of trust. Under high query loads when DNSSEC validation is active, it is possible for a condition to arise in which data from this cache of failing queries could be used before it was fully initialized, triggering an assertion failure.

This bug cannot be encountered unless your server is doing DNSSEC validation.


Discovery 2012-07-24
Entry 2012-07-24
bind99
lt 9.9.1.2

bind98
lt 9.8.3.2

bind97
lt 9.7.6.2

bind96
lt 9.6.3.1.ESV.R7.2

CVE-2012-3817
https://kb.isc.org/article/AA-00729