Vulnerabilità: CVE-2007-0493

Usa-after-free vulnerabilità in ISC BIND 9.3.0 fino a 9.3.3, 9.4.0a1 fino a 9.4.0a6, 9.4.0b1 fino a 9.4.0b4, 9.4.0rc1, e 9.5.0a1 (Forum Bind solo) permette aggressori remoti di causare un denial of service (crash demone named) attraverso vettori non specificati che causano nominato a ""dereference un liberato prendere contesto.""


http://lists.apple.com/archives/security-announce/2007/May/msg00004.html
http://www.securityfocus.com/bid/22229
http://www.securityfocus.com/archive/1/458066/100/0/threaded
http://docs.info.apple.com/article.html?artnum=305530
http://www.isc.org/index.pl?/sw/bind/bind-security.php
http://www.isc.org/index.pl?/sw/bind/view/?release=9.2.8
http://www.isc.org/index.pl?/sw/bind/view/?release=9.3.4
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04952488
https://issues.rpath.com/browse/RPL-989
http://fedoranews.org/cms/node/2507
http://fedoranews.org/cms/node/2537
http://security.freebsd.org/advisories/FreeBSD-SA-07:02.bind.asc
http://lists.grok.org.uk/pipermail/full-disclosure/2007-January/052018.html
http://security.gentoo.org/glsa/glsa-200702-06.xml
https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01070495
https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144
https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01070495
https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144
http://www.mandriva.com/security/advisories?name=MDKSA-2007:030
http://marc.info/?l=bind-announce&m=116968519321296&w=2
http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2007-003.txt.asc
http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.007.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9614
http://www.redhat.com/support/errata/RHSA-2007-0057.html
http://securitytracker.com/id?1017561
http://secunia.com/advisories/23904
http://secunia.com/advisories/23924
http://secunia.com/advisories/23943
http://secunia.com/advisories/23972
http://secunia.com/advisories/23974
http://secunia.com/advisories/23977
http://secunia.com/advisories/24014
http://secunia.com/advisories/24048
http://secunia.com/advisories/24054
http://secunia.com/advisories/24129
http://secunia.com/advisories/24203
http://secunia.com/advisories/24930
http://secunia.com/advisories/24950
http://secunia.com/advisories/25402
http://secunia.com/advisories/25649
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.494157
http://lists.suse.com/archive/suse-security-announce/2007-Jan/0016.html
http://www.trustix.org/errata/2007/0005
http://www.ubuntu.com/usn/usn-418-1
http://www.vupen.com/english/advisories/2007/0349
http://www.vupen.com/english/advisories/2007/1401
http://www.vupen.com/english/advisories/2007/1939
http://www.vupen.com/english/advisories/2007/2163
http://www.vupen.com/english/advisories/2007/2315
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0493


E' possibile lasciare un commento come utenti registrati al sito, accedendo tramite social, account wordpress oppure come utenti anonimi. Nel caso in cui si desideri lasciare un commento come utenti anonimi si verrà avvisati via email di un'eventuale risposta solo se si inserisce l'indirizzo email (facoltativo). L'inserimento di qualsiasi dato nei campi dei commenti è totalmente facoltativo. Chiunque decida di inserire un qualsiasi dato accetta il trattamento di questi ultimi per i fini inerenti al servizio ovvero la risposta al commento e le comunicazioni strettamente necessarie.


Rispondi