FreshPorts - VuXML

This page displays vulnerability information about FreeBSD Ports.

The last vuln.xml file processed by FreshPorts is:

Revision:  526079
Date:      2020-02-14
Time:      01:16:13Z
Committer: philip

List all Vulnerabilities, by package

List all Vulnerabilities, by date

These are the vulnerabilities relating to the commit you have selected:

VuXML IDDescription
c9075321-f483-11e5-92ce-002590263bf5bind -- denial of service vulnerability

ISC reports:

An error parsing input received by the rndc control channel can cause an assertion failure in sexpr.c or alist.c.


Discovery 2016-03-09
Entry 2016-03-28
Modified 2016-08-09
bind98
le 9.8.8

bind99
ge 9.9.0 lt 9.9.8P4

bind910
ge 9.10.0 lt 9.10.3P4

bind9-devel
lt 9.11.0.a20160309

FreeBSD
ge 9.3 lt 9.3_38

CVE-2016-1285
SA-16:13.bind
https://kb.isc.org/article/AA-01352
57a700f9-12c0-11e2-9f86-001d923933b6dns/bind9* -- crash on deliberately constructed combination of records

ISC reports:

A deliberately constructed combination of records could cause named to hang while populating the additional section of a response.


Discovery 2012-09-26
Entry 2012-10-10
bind99
lt 9.9.1.4

bind98
lt 9.8.3.4

bind97
lt 9.7.6.4

bind96
lt 9.6.3.1.ESV.R7.4

CVE-2012-5166
90cc1494-10ac-11e1-b3ec-0024e830109bBIND -- Remote DOS

The Internet Systems Consortium reports:

Organizations across the Internet reported crashes interrupting service on BIND 9 nameservers performing recursive queries. Affected servers crashed after logging an error in query.c with the following message: "INSIST(! dns_rdataset_isassociated(sigrdataset))" Multiple versions were reported being affected, including all currently supported release versions of ISC BIND 9.

Because it may be possible to trigger this bug even on networks that do not allow untrusted users to access the recursive name servers (perhaps via specially crafted e-mail messages, and/or malicious web sites) it is recommended that ALL operators of recursive name servers upgrade immediately.


Discovery 2011-11-16
Entry 2011-11-16
Modified 2012-01-29
FreeBSD
ge 7.3 lt 7.3_9

ge 7.4 lt 7.4_5

ge 8.1 lt 8.1_7

ge 8.2 lt 8.2_5

bind96
lt 9.6.3.1.ESV.R5.1

bind97
lt 9.7.4.1

bind98
lt 9.8.1.1

SA-11:06.bind
CVE-2011-4313
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4313
https://www.isc.org/software/bind/advisories/cve-2011-4313
1ecc0d3f-ae8e-11e1-965b-0024e88a8c98dns/bind9* -- zero-length RDATA can cause named to terminate, reveal memory

ISC reports:

Processing of DNS resource records where the rdata field is zero length may cause various issues for the servers handling them.

Processing of these records may lead to unexpected outcomes. Recursive servers may crash or disclose some portion of memory to the client. Secondary servers may crash on restart after transferring a zone containing these records. Master servers may corrupt zone data if the zone option "auto-dnssec" is set to "maintain". Other unexpected problems that are not listed here may also be encountered.

Impact: This issue primarily affects recursive nameservers. Authoritative nameservers will only be impacted if an administrator configures experimental record types with no data. If the server is configured this way, then secondaries can crash on restart after transferring that zone. Zone data on the master can become corrupted if the zone with those records has named configured to manage the DNSSEC key rotation.


Discovery 2012-06-04
Entry 2012-06-04
Modified 2012-06-06
bind99
lt 9.9.1.1

bind98
lt 9.8.3.1

bind97
lt 9.7.6.1

bind96
lt 9.6.3.1.ESV.R7.1

CVE-2012-1667
http://www.isc.org/software/bind/advisories/cve-2012-1667
90cc1494-10ac-11e1-b3ec-0024e830109bBIND -- Remote DOS

The Internet Systems Consortium reports:

Organizations across the Internet reported crashes interrupting service on BIND 9 nameservers performing recursive queries. Affected servers crashed after logging an error in query.c with the following message: "INSIST(! dns_rdataset_isassociated(sigrdataset))" Multiple versions were reported being affected, including all currently supported release versions of ISC BIND 9.

Because it may be possible to trigger this bug even on networks that do not allow untrusted users to access the recursive name servers (perhaps via specially crafted e-mail messages, and/or malicious web sites) it is recommended that ALL operators of recursive name servers upgrade immediately.


Discovery 2011-11-16
Entry 2011-11-16
Modified 2012-01-29
FreeBSD
ge 7.3 lt 7.3_9

ge 7.4 lt 7.4_5

ge 8.1 lt 8.1_7

ge 8.2 lt 8.2_5

bind96
lt 9.6.3.1.ESV.R5.1

bind97
lt 9.7.4.1

bind98
lt 9.8.1.1

SA-11:06.bind
CVE-2011-4313
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4313
https://www.isc.org/software/bind/advisories/cve-2011-4313
2892a8e2-3d68-11e2-8e01-0800273fe665dns/bind9* -- servers using DNS64 can be crashed by a crafted query

ISC reports:

BIND 9 nameservers using the DNS64 IPv6 transition mechanism are vulnerable to a software defect that allows a crafted query to crash the server with a REQUIRE assertion failure. Remote exploitation of this defect can be achieved without extensive effort, resulting in a denial-of-service (DoS) vector against affected servers.


Discovery 2012-11-27
Entry 2012-12-04
bind99
lt 9.9.2.1

bind99-base
lt 9.9.2.1

bind98
lt 9.8.4.1

bind98-base
lt 9.8.4.1

CVE-2012-5688
7a282e49-95b6-11e2-8433-0800273fe665dns/bind9* -- Malicious Regex Can Cause Memory Exhaustion

ISC reports:

A critical defect in BIND 9 allows an attacker to cause excessive memory consumption in named or other programs linked to libdns.


Discovery 2013-03-11
Entry 2013-03-27
bind99
lt 9.9.2.2

bind99-base
lt 9.9.2.2

bind98
lt 9.8.4.2

bind98-base
lt 9.8.4.2

CVE-2013-2266
57a700f9-12c0-11e2-9f86-001d923933b6dns/bind9* -- crash on deliberately constructed combination of records

ISC reports:

A deliberately constructed combination of records could cause named to hang while populating the additional section of a response.


Discovery 2012-09-26
Entry 2012-10-10
bind99
lt 9.9.1.4

bind98
lt 9.8.3.4

bind97
lt 9.7.6.4

bind96
lt 9.6.3.1.ESV.R7.4

CVE-2012-5166
ab3e98d9-8175-11e4-907d-d050992ecde8bind -- denial of service vulnerability

ISC reports:

We have today posted updated versions of 9.9.6 and 9.10.1 to address a significant security vulnerability in DNS resolution. The flaw was discovered by Florian Maury of ANSSI, and applies to any recursive resolver that does not support a limit on the number of recursions. [CERTFR-2014-AVI-512], [USCERT VU#264212]

A flaw in delegation handling could be exploited to put named into an infinite loop, in which each lookup of a name server triggered additional lookups of more name servers. This has been addressed by placing limits on the number of levels of recursion named will allow (default 7), and on the number of queries that it will send before terminating a recursive query (default 50). The recursion depth limit is configured via the max-recursion-depth option, and the query limit via the max-recursion-queries option. For more information, see the security advisory at https://kb.isc.org/article/AA-01216/. [CVE-2014-8500] [RT #37580]

In addition, we have also corrected a potential security vulnerability in the GeoIP feature in the 9.10.1 release only. For more information on this issue, see the security advisory at https://kb.isc.org/article/AA-01217. [CVE-2014-8680]


Discovery 2014-12-08
Entry 2014-12-11
Modified 2016-08-09
bind99
bind99-base
lt 9.9.6

bind98
bind98-base
bind96
bind96-base
gt 0

FreeBSD
ge 9.3 lt 9.3_6

ge 9.2 lt 9.2_16

ge 9.1 lt 9.1_23

ge 8.4 lt 8.4_20

SA-14:29.bind
CVE-2014-8500
CVE-2014-8680
https://www.isc.org/blogs/important-security-advisory-posted/
cb252f01-7c43-11e3-b0a6-005056a37f68bind -- denial of service vulnerability

ISC reports:

Because of a defect in handling queries for NSEC3-signed zones, BIND can crash with an "INSIST" failure in name.c when processing queries possessing certain properties. By exploiting this defect an attacker deliberately constructing a query with the right properties could achieve denial of service against an authoritative nameserver serving NSEC3-signed zones.


Discovery 2014-01-08
Entry 2014-01-13
Modified 2016-08-09
bind99
lt 9.9.4.2

bind99-base
lt 9.9.4.2

bind98
lt 9.8.6.2

bind98-base
lt 9.8.6.2

bind96
lt 9.6.3.2.ESV.R10.2

bind96-base
lt 9.6.3.2.ESV.R10.2

FreeBSD
ge 9.2 lt 9.2_3

ge 9.1 lt 9.1_10

ge 8.4 lt 8.4_7

ge 8.3 lt 8.3_14

CVE-2014-0591
SA-14:04.bind
https://kb.isc.org/article/AA-01078/74/
0bc67930-d5c3-11e1-bef6-0024e81297aedns/bind9* -- Heavy DNSSEC Validation Load Can Cause a 'Bad Cache' Assertion Failure

ISC reports:

High numbers of queries with DNSSEC validation enabled can cause an assertion failure in named, caused by using a 'bad cache' data structure before it has been initialized.

BIND 9 stores a cache of query names that are known to be failing due to misconfigured name servers or a broken chain of trust. Under high query loads when DNSSEC validation is active, it is possible for a condition to arise in which data from this cache of failing queries could be used before it was fully initialized, triggering an assertion failure.

This bug cannot be encountered unless your server is doing DNSSEC validation.


Discovery 2012-07-24
Entry 2012-07-24
bind99
lt 9.9.1.2

bind98
lt 9.8.3.2

bind97
lt 9.7.6.2

bind96
lt 9.6.3.1.ESV.R7.2

CVE-2012-3817
https://kb.isc.org/article/AA-00729
cba246d2-f483-11e5-92ce-002590263bf5bind -- denial of service vulnerability

ISC reports:

A problem parsing resource record signatures for DNAME resource records can lead to an assertion failure in resolver.c or db.c


Discovery 2016-03-09
Entry 2016-03-28
Modified 2016-08-09
bind98
le 9.8.8

bind99
ge 9.9.0 lt 9.9.8P4

bind910
ge 9.10.0 lt 9.10.3P4

bind9-devel
lt 9.11.0.a20160309

FreeBSD
ge 9.3 lt 9.3_38

CVE-2016-1286
SA-16:13.bind
https://kb.isc.org/article/AA-01353
0bc67930-d5c3-11e1-bef6-0024e81297aedns/bind9* -- Heavy DNSSEC Validation Load Can Cause a 'Bad Cache' Assertion Failure

ISC reports:

High numbers of queries with DNSSEC validation enabled can cause an assertion failure in named, caused by using a 'bad cache' data structure before it has been initialized.

BIND 9 stores a cache of query names that are known to be failing due to misconfigured name servers or a broken chain of trust. Under high query loads when DNSSEC validation is active, it is possible for a condition to arise in which data from this cache of failing queries could be used before it was fully initialized, triggering an assertion failure.

This bug cannot be encountered unless your server is doing DNSSEC validation.


Discovery 2012-07-24
Entry 2012-07-24
bind99
lt 9.9.1.2

bind98
lt 9.8.3.2

bind97
lt 9.7.6.2

bind96
lt 9.6.3.1.ESV.R7.2

CVE-2012-3817
https://kb.isc.org/article/AA-00729
53a0ddef-0208-11e2-8afa-0024e830109bdns/bind9* -- Several vulnerabilities

ISC reports:

Prevents a crash when queried for a record whose RDATA exceeds 65535 bytes.

Prevents a crash when validating caused by using "Bad cache" data before it has been initialized.

ISC_QUEUE handling for recursive clients was updated to address a race condition that could cause a memory leak. This rarely occurred with UDP clients, but could be a significant problem for a server handling a steady rate of TCP queries.

A condition has been corrected where improper handling of zero-length RDATA could cause undesirable behavior, including termination of the named process.


Discovery 2012-09-12
Entry 2012-09-18
bind99
lt 9.9.1.3

bind98
lt 9.8.3.3

bind97
lt 9.7.6.3

bind96
lt 9.6.3.1.ESV.R7.3