svn commit: r431223 - head/security/vuxml
Xin LI
delphij at FreeBSD.org
Thu Jan 12 07:27:15 UTC 2017
Author: delphij
Date: Thu Jan 12 07:27:14 2017
New Revision: 431223
URL: https://svnweb.freebsd.org/changeset/ports/431223
Log:
Document BIND multiple vulnerabilities.
Modified:
head/security/vuxml/vuln.xml
Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml Thu Jan 12 07:12:47 2017 (r431222)
+++ head/security/vuxml/vuln.xml Thu Jan 12 07:27:14 2017 (r431223)
@@ -58,6 +58,94 @@ Notes:
* Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="d4c7e9a9-d893-11e6-9b4d-d050996490d0">
+ <topic>BIND -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>bind99</name>
+ <range><lt>9.9.9P5</lt></range>
+ </package>
+ <package>
+ <name>bind910</name>
+ <range><lt>9.10.4P5</lt></range>
+ </package>
+ <package>
+ <name>bind911</name>
+ <range><lt>9.11.0P2</lt></range>
+ </package>
+ <package>
+ <name>bind9-devel</name>
+ <range><ge>0</ge></range>
+ </package>
+ <package>
+ <name>FreeBSD</name>
+ <range><ge>9.3</ge><lt>10.0</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>ISC reports:</p>
+ <blockquote cite="https://kb.isc.org/article/AA-01439/0">
+ <p>A malformed query response received by a recursive
+ server in response to a query of RTYPE ANY could
+ trigger an assertion failure while named is attempting
+ to add the RRs in the query response to the cache.</p>
+ </blockquote>
+ <blockquote cite="https://kb.isc.org/article/AA-01440/0">
+ <p>Depending on the type of query and the EDNS options
+ in the query they receive, DNSSEC-enabled authoritative
+ servers are expected to include RRSIG and other RRsets
+ in their responses to recursive servers.
+ DNSSEC-validating servers will also make specific queries
+ for DS and other RRsets.
+ Whether DNSSEC-validating or not, an error in processing
+ malformed query responses that contain DNSSEC-related
+ RRsets that are inconsistent with other RRsets in the
+ same query response can trigger an assertion failure.
+ Although the combination of properties which triggers
+ the assertion should not occur in normal traffic, it
+ is potentially possible for the assertion to be triggered
+ deliberately by an attacker sending a specially-constructed
+ answer.</p>
+ </blockquote>
+ <blockquote cite="https://kb.isc.org/article/AA-01441/0">
+ <p>An unusually-formed answer containing a DS resource
+ record could trigger an assertion failure. While the
+ combination of properties which triggers the assertion
+ should not occur in normal traffic, it is potentially
+ possible for the assertion to be triggered deliberately
+ by an attacker sending a specially-constructed answer
+ having the required properties.</p>
+ </blockquote>
+ <blockquote cite="https://kb.isc.org/article/AA-01442/0">
+ <p>An error in handling certain queries can cause an
+ assertion failure when a server is using the
+ nxdomain-redirect feature to cover a zone for which
+ it is also providing authoritative service.
+ A vulnerable server could be intentionally stopped
+ by an attacker if it was using a configuration that
+ met the criteria for the vulnerability and if the
+ attacker could cause it to accept a query that
+ possessed the required attributes.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2016-9131</cvename>
+ <cvename>CVE-2016-9147</cvename>
+ <cvename>CVE-2016-9444</cvename>
+ <cvename>CVE-2016-9778</cvename>
+ <url>https://kb.isc.org/article/AA-01439/0</url>
+ <url>https://kb.isc.org/article/AA-01440/0</url>
+ <url>https://kb.isc.org/article/AA-01441/0</url>
+ <url>https://kb.isc.org/article/AA-01442/0</url>
+ </references>
+ <dates>
+ <discovery>2017-01-11</discovery>
+ <entry>2017-01-12</entry>
+ </dates>
+ </vuln>
+
<vuln vid="2c948527-d823-11e6-9171-14dae9d210b8">
<topic>FreeBSD -- OpenSSH multiple vulnerabilities</topic>
<affects>
More information about the svn-ports-all
mailing list