This page displays vulnerability information about FreeBSD Ports.
The last vuln.xml file processed by FreshPorts is:
Revision: 504388 Date: 2019-06-17 Time: 05:24:51Z Committer: tobik
List all Vulnerabilities, by package
List all Vulnerabilities, by date
These are the vulnerabilities relating to the commit you have selected:
|83725c91-7c7e-11de-9672-00e0815b8da8||BIND -- Dynamic update message remote DoS|
When named(8) receives a specially crafted dynamic update message an internal assertion check is triggered which causes named(8) to exit.
To trigger the problem, the dynamic update message must contains a record of type "ANY" and at least one resource record set (RRset) for this fully qualified domain name (FQDN) must exist on the server.
An attacker which can send DNS requests to a nameserver can cause it to exit, thus creating a Denial of Service situation.
No generally applicable workaround is available, but some firewalls may be able to prevent nsupdate DNS packets from reaching the nameserver.
NOTE WELL: Merely configuring named(8) to ignore dynamic updates is NOT sufficient to protect it from this vulnerability.
ge 6.3 lt 6.3_12
ge 6.4 lt 6.4_6
ge 7.1 lt 7.1_7
ge 7.2 lt 7.2_3