version 1.561, 2006/09/02 23:58:06 |
version 1.562, 2006/09/08 20:35:11 |
|
|
<a name="vax"></a> |
<a name="vax"></a> |
<ul> |
<ul> |
|
|
|
<li><a name="bind"></a> |
|
<font color="#009000"><strong>010: SECURITY FIX: September 8, 2006</strong></font> <i>All architectures</i><br> |
|
Two Denial of Service issues have been found with BIND. |
|
An attacker who can perform recursive lookups on a DNS server and is able |
|
to send a sufficiently large number of recursive queries, or is able to |
|
get the DNS server to return more than one SIG(covered) RRsets can stop |
|
the functionality of the DNS service. |
|
An attacker querying an authoritative DNS server serving a RFC 2535 |
|
DNSSEC zone may be able to crash the DNS server. |
|
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4095">CVE-2006-4095</a> |
|
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4096">CVE-2006-4096</a> |
|
<br> |
|
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/010_bind.patch"> |
|
A source code patch exists which remedies this problem</a>.<br> |
|
<p> |
|
|
<li><a name="sppp"></a> |
<li><a name="sppp"></a> |
<font color="#009000"><strong>009: SECURITY FIX: September 2, 2006</strong></font> <i>All architectures</i><br> |
<font color="#009000"><strong>009: SECURITY FIX: September 2, 2006</strong></font> <i>All architectures</i><br> |
Due to the failure to correctly validate LCP configuration option lengths, |
Due to the failure to correctly validate LCP configuration option lengths, |