ID

VAR-201509-0223


CVE

CVE-2015-5986


TITLE

ISC BIND of named of openpgpkey_61.c Service disruption in (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2015-004611

DESCRIPTION

openpgpkey_61.c in named in ISC BIND 9.9.7 before 9.9.7-P3 and 9.10.x before 9.10.2-P4 allows remote attackers to cause a denial of service (REQUIRE assertion failure and daemon exit) via a crafted DNS response. ISC BIND is prone to a remote denial-of-service vulnerability. Attackers can exploit this issue to cause a denial-of-service condition. ISC BIND is a set of open source software that implements the DNS protocol maintained by the Internet Systems Consortium (ISC) company in the United States. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 APPLE-SA-2015-10-21-8 OS X Server 5.0.15 OS X Server 5.0.15 is now available and addresses the following: BIND Available for: OS X Yosemite 10.10.5, OS X El Capitan 10.11.1 or later Impact: Multiple vulnerabilities in BIND Description: Multiple vulnerabilities existed in BIND versions prior to 9.9.7-P3, one of which may have allowed a remote attacker to cause a denial of service. These issues were addressed by updating BIND to version 9.9.7-P3. CVE-ID CVE-2015-5722 : Hanno Böck from the Fuzzing Project CVE-2015-5986 Web Service Available for: OS X Yosemite 10.10.5, OS X El Capitan 10.11.1 or later Impact: A remote attacker may be able to bypass access restrictions Description: An HTTP header field reference was missing from the configuration files. This issue was addressed by adding the HTTP header field reference to the configuration file. CVE-ID CVE-2015-7031 : an anonymous researcher Installation note: OS X Server 5.0.15 may be obtained from the Mac App Store. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 [slackware-security] bind (SSA:2015-245-01) New bind packages are available for Slackware 13.0, 13.1, 13.37, 14.0, 14.1, and -current to fix security issues. Here are the details from the Slackware 14.1 ChangeLog: +--------------------------+ patches/packages/bind-9.9.7_P3-i486-1_slack14.1.txz: Upgraded. This update fixes two denial-of-service vulnerabilities: + CVE-2015-5722 is a denial-of-service vector which can be exploited remotely against a BIND server that is performing validation on DNSSEC-signed records. Validating recursive resolvers are at the greatest risk from this defect, but it has not been ruled out that it could be exploited against an authoritative-only nameserver under limited conditions. Servers that are not performing validation are not vulnerable. However, ISC does not recommend disabling validation as a workaround to this issue as it exposes the server to other types of attacks. Upgrading to the patched versions is the recommended solution. All versions of BIND since 9.0.0 are vulnerable to CVE-2015-5722. Recursive resolvers are at the greatest risk from this defect, but it has not been ruled out that it could be exploited against an authoritative-only nameserver under limited conditions. Only versions of BIND since 9.9.7 and 9.10.2 are vulnerable to CVE-2015-5986. For more information, see: https://kb.isc.org/article/AA-01287/0 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5722 https://kb.isc.org/article/AA-01291/0 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5986 (* Security fix *) +--------------------------+ Where to find the new packages: +-----------------------------+ Thanks to the friendly folks at the OSU Open Source Lab (http://osuosl.org) for donating FTP and rsync hosting to the Slackware project! :-) Also see the "Get Slack" section on http://slackware.com for additional mirror sites near you. Updated package for Slackware 13.0: ftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/packages/bind-9.9.7_P3-i486-1_slack13.0.txz Updated package for Slackware x86_64 13.0: ftp://ftp.slackware.com/pub/slackware/slackware64-13.0/patches/packages/bind-9.9.7_P3-x86_64-1_slack13.0.txz Updated package for Slackware 13.1: ftp://ftp.slackware.com/pub/slackware/slackware-13.1/patches/packages/bind-9.9.7_P3-i486-1_slack13.1.txz Updated package for Slackware x86_64 13.1: ftp://ftp.slackware.com/pub/slackware/slackware64-13.1/patches/packages/bind-9.9.7_P3-x86_64-1_slack13.1.txz Updated package for Slackware 13.37: ftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/bind-9.9.7_P3-i486-1_slack13.37.txz Updated package for Slackware x86_64 13.37: ftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/bind-9.9.7_P3-x86_64-1_slack13.37.txz Updated package for Slackware 14.0: ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/bind-9.9.7_P3-i486-1_slack14.0.txz Updated package for Slackware x86_64 14.0: ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/bind-9.9.7_P3-x86_64-1_slack14.0.txz Updated package for Slackware 14.1: ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/bind-9.9.7_P3-i486-1_slack14.1.txz Updated package for Slackware x86_64 14.1: ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/bind-9.9.7_P3-x86_64-1_slack14.1.txz Updated package for Slackware -current: ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/bind-9.10.2_P4-i586-1.txz Updated package for Slackware x86_64 -current: ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/bind-9.10.2_P4-x86_64-1.txz MD5 signatures: +-------------+ Slackware 13.0 package: 627f6c6827eca24776d790166801de25 bind-9.9.7_P3-i486-1_slack13.0.txz Slackware x86_64 13.0 package: 49082f50322af84efe8d91459599b837 bind-9.9.7_P3-x86_64-1_slack13.0.txz Slackware 13.1 package: 4dd375df46e84dbecb9f296e2fec692a bind-9.9.7_P3-i486-1_slack13.1.txz Slackware x86_64 13.1 package: 90b4376b145544d9a63c28dcb891ca47 bind-9.9.7_P3-x86_64-1_slack13.1.txz Slackware 13.37 package: 181ce9e11eb9d909c5c06b8ddd5bb1b5 bind-9.9.7_P3-i486-1_slack13.37.txz Slackware x86_64 13.37 package: 368f7a3b977865b0132bdcd129e70813 bind-9.9.7_P3-x86_64-1_slack13.37.txz Slackware 14.0 package: 3bb80a54fb5d0f76d17ef33cf06a074d bind-9.9.7_P3-i486-1_slack14.0.txz Slackware x86_64 14.0 package: d77b36e48e2c033ffa9d99816979304f bind-9.9.7_P3-x86_64-1_slack14.0.txz Slackware 14.1 package: ada9c70208885b4c7904364e040360f9 bind-9.9.7_P3-i486-1_slack14.1.txz Slackware x86_64 14.1 package: a78fbe27ba2834d2918fa26ce96d5083 bind-9.9.7_P3-x86_64-1_slack14.1.txz Slackware -current package: 450614c08d5fac56c8d2701394d1af50 n/bind-9.10.2_P4-i586-1.txz Slackware x86_64 -current package: 32e680d6bce8dac3ad5ba54958f68f95 n/bind-9.10.2_P4-x86_64-1.txz Installation instructions: +------------------------+ Upgrade the package as root: # upgradepkg bind-9.9.7_P3-i486-1_slack14.1.txz Then, restart the name server: # /etc/rc.d/rc.bind restart +-----+ Slackware Linux Security Team http://slackware.com/gpg-key security@slackware.com +------------------------------------------------------------------------+ | To leave the slackware-security mailing list: | +------------------------------------------------------------------------+ | Send an email to majordomo@slackware.com with this text in the body of | | the email message: | | | | unsubscribe slackware-security | | | | You will get a confirmation message back containing instructions to | | complete the process. Please do not reply to this email address. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 ============================================================================= FreeBSD-SA-15:23.bind Security Advisory The FreeBSD Project Topic: BIND remote denial of service vulnerability Category: contrib Module: bind Announced: 2015-09-02 Credits: ISC Affects: FreeBSD 9.x Corrected: 2015-09-02 20:06:46 UTC (stable/9, 9.3-STABLE) 2015-09-02 20:07:03 UTC (releng/9.3, 9.3-RELEASE-p25) CVE Name: CVE-2015-5722 For general information regarding FreeBSD Security Advisories, including descriptions of the fields above, security branches, and the following sections, please visit <URL:https://security.FreeBSD.org/>. I. Background BIND 9 is an implementation of the Domain Name System (DNS) protocols. The named(8) daemon is an Internet Domain Name Server. The libdns library is a library of DNS protocol support functions. II. Problem Description Parsing a malformed DNSSEC key can cause a validating resolver to exit due to a failed assertion in buffer.c. III. Recursive servers are at greatest risk, however, an authoritative server could also be affected, if an attacker controls a zone that the server must query against to perform its zone service. IV. Workaround No workaround is available, but hosts not running named(8) are not vulnerable. V. Solution Perform one of the following: 1) Upgrade your vulnerable system to a supported FreeBSD stable or release / security branch (releng) dated after the correction date. The named service has to be restarted after the update. A reboot is recommended but not required. 2) To update your vulnerable system via a binary patch: Systems running a RELEASE version of FreeBSD on the i386 or amd64 platforms can be updated via the freebsd-update(8) utility: # freebsd-update fetch # freebsd-update install The named service has to be restarted after the update. A reboot is recommended but not required. 3) To update your vulnerable system via a source code patch: The following patches have been verified to apply to the applicable FreeBSD release branches. a) Download the relevant patch from the location below, and verify the detached PGP signature using your PGP utility. [FreeBSD 9.3] # fetch https://security.FreeBSD.org/patches/SA-15:23/bind.patch # fetch https://security.FreeBSD.org/patches/SA-15:23/bind.patch.asc # gpg --verify bind.patch.asc Please note that FreeBSD 9.3-STABLE is also affected by another issue (CVE-2015-5986), and a different patch should be used. b) Apply the patch. Execute the following commands as root: # cd /usr/src # patch < /path/to/patch c) Recompile the operating system using buildworld and installworld as described in <URL:https://www.FreeBSD.org/handbook/makeworld.html>. Restart the named(8) daemon, or reboot the system. VI. Correction details The following list contains the correction revision numbers for each affected branch. Branch/path Revision - ------------------------------------------------------------------------- stable/9/ r287409 releng/9.3/ r287410 - ------------------------------------------------------------------------- To see which files were modified by a particular revision, run the following command, replacing NNNNNN with the revision number, on a machine with Subversion installed: # svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base Or visit the following URL, replacing NNNNNN with the revision number: <URL:https://svnweb.freebsd.org/base?view=revision&revision=NNNNNN> VII. References <URL:https://kb.isc.org/article/AA-01287> <URL:https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5722> CVE-2015-5986 is listed here for completeness and affects FreeBSD 9.3-STABLE but not FreeBSD 9.3-RELEASE: <URL:https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5986> The latest revision of this advisory is available at <URL:https://security.FreeBSD.org/advisories/FreeBSD-SA-15:23.bind.asc> -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.1.7 (FreeBSD) iQIcBAEBCgAGBQJV52K9AAoJEO1n7NZdz2rnYQEP/1MY+pxPVMWT86qNKZ8upUpH LadLmtYAERrT9SMBrEFNCgylRdwNabTPKU0ZtxW8I57rks+j4bci053qo9Z7Hyo0 tbK3hTtxJZHNBO1G+NFfQxx9U+R+86Korx3NvDiB78XkJaab5On3dSgIMJYPEIL+ h0NEfYqe+X+LYg3W46faPdIuOsgxWSYN1T6mcZ5B5lucbT+LXjA5sRj+rUcE+a4O 2lIdM1oesWOZrEZo9FjK3UPvBbiEZkspr5IBd0zA825+BZNOpk06SOS/f3N0Pz8u S2vGlxcT37CzC9fPgjQpcNBmB+76xLgz74Inj4uPDSvCz+wmmcr95YOgheZb2N6K Bqakzy9TyRNk1aa8VXb8XpfyfMzroWG/vNjV6trI5wry7U0zRSl4dz+XAoz0A/eO 9ue88iWsVh97HBWKH94K8ZCA49G3NLgkbDkJ3awS4TfIKwwh9bGDiDepu1KMqnC1 EzyRk2fnr9JIreLj5zR1ctL1xGUvBIzWvHeT72PjgdZ/hqDoXTHKSVnDoR0c6T+U bJBJSLi3KUqaMkKRJez84r7G8RKtudLT292l4UQ3qgbiuaXagY6m1W0WBpLvw/zv RQOsG3HPpDrrV/LiSWKybEX2hIqIHd3tssfjQqvMa4WLO3h8wVONjw74YgRzZaYb t/1F4r4UYtfIJ7omydxx =B0u1 -----END PGP SIGNATURE----- . - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201510-01 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - https://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Normal Title: BIND: Denial of Service Date: October 18, 2015 Bugs: #540640, #553584, #556150, #559462 ID: 201510-01 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== A vulnerability in BIND could lead to a Denial of Service condition. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 net-dns/bind < 9.10.2_p4 >= 9.10.2_p4 Description =========== A vulnerability has been discovered in BIND's named utility leading to a Denial of Service condition. Resolution ========== All BIND users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=net-dns/bind-9.10.2_p4" References ========== [ 1 ] CVE-2015-1349 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1349 [ 2 ] CVE-2015-4620 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4620 [ 3 ] CVE-2015-5477 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5477 [ 4 ] CVE-2015-5722 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5722 [ 5 ] CVE-2015-5986 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5986 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: https://security.gentoo.org/glsa/201510-01 Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2015 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5

Trust: 2.43

sources: NVD: CVE-2015-5986 // JVNDB: JVNDB-2015-004611 // BID: 76618 // VULHUB: VHN-83947 // VULMON: CVE-2015-5986 // PACKETSTORM: 134059 // PACKETSTORM: 133411 // PACKETSTORM: 133434 // PACKETSTORM: 134008

AFFECTED PRODUCTS

vendor:iscmodel:bindscope:lteversion:9.9.7

Trust: 1.0

vendor:applemodel:mac os x serverscope:eqversion:5.0.15

Trust: 1.0

vendor:iscmodel:bindscope:lteversion:9.10.2

Trust: 1.0

vendor:iscmodel:bindscope:eqversion:9.10.2 to 9.10.2-p3

Trust: 0.8

vendor:iscmodel:bindscope:eqversion:9.9.7 to 9.9.7-p2

Trust: 0.8

vendor:applemodel:macos serverscope:ltversion:5.0.15 (os x el capitan 10.11.1 or later )

Trust: 0.8

vendor:applemodel:macos serverscope:ltversion:5.0.15 (os x yosemite 10.10.5)

Trust: 0.8

vendor:necmodel:express5800scope:eqversion:/sg series intersecvm/sg v1.2

Trust: 0.8

vendor:necmodel:express5800scope:eqversion:v3.0

Trust: 0.8

vendor:necmodel:express5800scope:eqversion:v3.1

Trust: 0.8

vendor:necmodel:express5800scope:eqversion:v4.0

Trust: 0.8

vendor:necmodel:express5800scope:eqversion:/sg series sg3600lm/lg/lj v6.1

Trust: 0.8

vendor:necmodel:express5800scope:eqversion:v6.2

Trust: 0.8

vendor:necmodel:express5800scope:eqversion:v7.0

Trust: 0.8

vendor:necmodel:express5800scope:eqversion:v7.1

Trust: 0.8

vendor:necmodel:express5800scope:eqversion:v8.0

Trust: 0.8

vendor:necmodel:express5800scope:eqversion:/sg series univerge sg3000lg/lj

Trust: 0.8

vendor:iscmodel:bindscope:eqversion:9.10.2

Trust: 0.6

vendor:slackwaremodel:linux x86 64 -currentscope: - version: -

Trust: 0.3

vendor:slackwaremodel:linux x86 64scope:eqversion:13.37

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:13.37

Trust: 0.3

vendor:slackwaremodel:linux x86 64scope:eqversion:13.1

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:13.1

Trust: 0.3

vendor:slackwaremodel:linux x86 64scope:eqversion:13.0

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:13.0

Trust: 0.3

vendor:slackwaremodel:linux -currentscope: - version: -

Trust: 0.3

vendor:gentoomodel:linuxscope: - version: -

Trust: 0.3

sources: BID: 76618 // JVNDB: JVNDB-2015-004611 // CNNVD: CNNVD-201509-058 // NVD: CVE-2015-5986

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-5986
value: HIGH

Trust: 1.0

NVD: CVE-2015-5986
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201509-058
value: HIGH

Trust: 0.6

VULHUB: VHN-83947
value: HIGH

Trust: 0.1

VULMON: CVE-2015-5986
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2015-5986
severity: HIGH
baseScore: 7.1
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-83947
severity: HIGH
baseScore: 7.1
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-83947 // VULMON: CVE-2015-5986 // JVNDB: JVNDB-2015-004611 // CNNVD: CNNVD-201509-058 // NVD: CVE-2015-5986

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

sources: VULHUB: VHN-83947 // JVNDB: JVNDB-2015-004611 // NVD: CVE-2015-5986

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 133434 // CNNVD: CNNVD-201509-058

TYPE

input validation

Trust: 0.6

sources: CNNVD: CNNVD-201509-058

CONFIGURATIONS

sources: JVNDB: JVNDB-2015-004611

PATCH

title:APPLE-SA-2015-10-21-8 OS X Server 5.0.15url:http://lists.apple.com/archives/security-announce/2015/Oct/msg00009.html

Trust: 0.8

title:HT205376url:https://support.apple.com/en-us/HT205376

Trust: 0.8

title:HT205376url:https://support.apple.com/ja-jp/HT205376

Trust: 0.8

title:CVE-2015-5986: An incorrect boundary check can trigger a REQUIRE assertion failure in openpgpkey_61.curl:https://kb.isc.org/article/AA-01291

Trust: 0.8

title:NV16-011url:http://jpn.nec.com/security-info/secinfo/nv16-011.html

Trust: 0.8

title:Apple: OS X Server 5.0.15url:https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories&qid=e4f689e38c48c81fbfd32d7313793956

Trust: 0.1

title:stran0surl:https://github.com/stran0s/stran0s

Trust: 0.1

title:afl-cveurl:https://github.com/mrash/afl-cve

Trust: 0.1

sources: VULMON: CVE-2015-5986 // JVNDB: JVNDB-2015-004611

EXTERNAL IDS

db:NVDid:CVE-2015-5986

Trust: 3.3

db:ISCid:AA-01291

Trust: 2.2

db:BIDid:76618

Trust: 1.5

db:ISCid:AA-01306

Trust: 1.2

db:ISCid:AA-01307

Trust: 1.2

db:ISCid:AA-01438

Trust: 1.2

db:ISCid:AA-01305

Trust: 1.2

db:MCAFEEid:SB10134

Trust: 1.2

db:SECTRACKid:1033453

Trust: 1.2

db:JVNid:JVNVU91383623

Trust: 0.8

db:JVNid:JVNVU92655282

Trust: 0.8

db:JVNDBid:JVNDB-2015-004611

Trust: 0.8

db:CNNVDid:CNNVD-201509-058

Trust: 0.7

db:ISCid:AA-01287

Trust: 0.2

db:VULHUBid:VHN-83947

Trust: 0.1

db:VULMONid:CVE-2015-5986

Trust: 0.1

db:PACKETSTORMid:134059

Trust: 0.1

db:PACKETSTORMid:133411

Trust: 0.1

db:PACKETSTORMid:133434

Trust: 0.1

db:PACKETSTORMid:134008

Trust: 0.1

sources: VULHUB: VHN-83947 // VULMON: CVE-2015-5986 // BID: 76618 // JVNDB: JVNDB-2015-004611 // PACKETSTORM: 134059 // PACKETSTORM: 133411 // PACKETSTORM: 133434 // PACKETSTORM: 134008 // CNNVD: CNNVD-201509-058 // NVD: CVE-2015-5986

REFERENCES

url:https://kb.isc.org/article/aa-01291

Trust: 2.1

url:https://security.gentoo.org/glsa/201510-01

Trust: 1.3

url:http://lists.apple.com/archives/security-announce/2015/oct/msg00009.html

Trust: 1.2

url:http://www.securityfocus.com/bid/76618

Trust: 1.2

url:https://kb.isc.org/article/aa-01305

Trust: 1.2

url:https://kb.isc.org/article/aa-01306

Trust: 1.2

url:https://kb.isc.org/article/aa-01307

Trust: 1.2

url:https://kb.isc.org/article/aa-01438

Trust: 1.2

url:https://security.netapp.com/advisory/ntap-20190730-0001/

Trust: 1.2

url:https://support.apple.com/ht205376

Trust: 1.2

url:http://lists.fedoraproject.org/pipermail/package-announce/2015-september/165810.html

Trust: 1.2

url:http://lists.fedoraproject.org/pipermail/package-announce/2015-september/167465.html

Trust: 1.2

url:http://www.securitytracker.com/id/1033453

Trust: 1.2

url:https://kc.mcafee.com/corporate/index?page=content&id=sb10134

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-5986

Trust: 0.9

url:http://www.jpcert.or.jp/at/2015/at150031.html

Trust: 0.8

url:http://jprs.jp/tech/security/2015-09-03-bind9-vuln-openpgpkey.html

Trust: 0.8

url:http://jvn.jp/vu/jvnvu91383623/index.html

Trust: 0.8

url:http://jvn.jp/vu/jvnvu92655282/

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-5986

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2015-5722

Trust: 0.4

url:http://www.isc.org/products/bind/

Trust: 0.3

url:https://www.us-cert.gov/ncas/current-activity/2015/09/16/internet-systems-consortium-isc-releases-security-updates-bind

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21968076

Trust: 0.3

url:http://seclists.org/oss-sec/2015/q3/483

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2015-5986

Trust: 0.3

url:https://kc.mcafee.com/corporate/index?page=content&amp;id=sb10134

Trust: 0.1

url:https://cwe.mitre.org/data/definitions/20.html

Trust: 0.1

url:http://tools.cisco.com/security/center/viewalert.x?alertid=40837

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://nmap.org/nsedoc/scripts/vulners.html

Trust: 0.1

url:https://support.apple.com/kb/ht201222

Trust: 0.1

url:https://www.apple.com/support/security/pgp/

Trust: 0.1

url:https://gpgtools.org

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-7031

Trust: 0.1

url:http://slackware.com

Trust: 0.1

url:http://osuosl.org)

Trust: 0.1

url:https://kb.isc.org/article/aa-01287/0

Trust: 0.1

url:http://slackware.com/gpg-key

Trust: 0.1

url:https://kb.isc.org/article/aa-01291/0

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-5722

Trust: 0.1

url:https://www.freebsd.org/handbook/makeworld.html>.

Trust: 0.1

url:https://security.freebsd.org/>.

Trust: 0.1

url:https://security.freebsd.org/patches/sa-15:23/bind.patch

Trust: 0.1

url:https://security.freebsd.org/advisories/freebsd-sa-15:23.bind.asc>

Trust: 0.1

url:https://kb.isc.org/article/aa-01287>

Trust: 0.1

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-5986>

Trust: 0.1

url:https://svnweb.freebsd.org/base?view=revision&revision=nnnnnn>

Trust: 0.1

url:https://security.freebsd.org/patches/sa-15:23/bind.patch.asc

Trust: 0.1

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-5722>

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4620

Trust: 0.1

url:http://creativecommons.org/licenses/by-sa/2.5

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1349

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-5986

Trust: 0.1

url:https://bugs.gentoo.org.

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-4620

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-5477

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-5722

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-5477

Trust: 0.1

url:https://security.gentoo.org/

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-1349

Trust: 0.1

sources: VULHUB: VHN-83947 // VULMON: CVE-2015-5986 // BID: 76618 // JVNDB: JVNDB-2015-004611 // PACKETSTORM: 134059 // PACKETSTORM: 133411 // PACKETSTORM: 133434 // PACKETSTORM: 134008 // CNNVD: CNNVD-201509-058 // NVD: CVE-2015-5986

CREDITS

The vendor reported this issue.

Trust: 0.3

sources: BID: 76618

SOURCES

db:VULHUBid:VHN-83947
db:VULMONid:CVE-2015-5986
db:BIDid:76618
db:JVNDBid:JVNDB-2015-004611
db:PACKETSTORMid:134059
db:PACKETSTORMid:133411
db:PACKETSTORMid:133434
db:PACKETSTORMid:134008
db:CNNVDid:CNNVD-201509-058
db:NVDid:CVE-2015-5986

LAST UPDATE DATE

2024-08-14T13:13:44.930000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-83947date:2016-12-31T00:00:00
db:VULMONid:CVE-2015-5986date:2016-12-31T00:00:00
db:BIDid:76618date:2016-07-06T14:04:00
db:JVNDBid:JVNDB-2015-004611date:2016-06-23T00:00:00
db:CNNVDid:CNNVD-201509-058date:2015-09-10T00:00:00
db:NVDid:CVE-2015-5986date:2016-12-31T02:59:34.110

SOURCES RELEASE DATE

db:VULHUBid:VHN-83947date:2015-09-05T00:00:00
db:VULMONid:CVE-2015-5986date:2015-09-05T00:00:00
db:BIDid:76618date:2015-09-02T00:00:00
db:JVNDBid:JVNDB-2015-004611date:2015-09-09T00:00:00
db:PACKETSTORMid:134059date:2015-10-21T22:22:22
db:PACKETSTORMid:133411date:2015-09-03T22:26:39
db:PACKETSTORMid:133434date:2015-09-02T19:32:22
db:PACKETSTORMid:134008date:2015-10-18T21:06:41
db:CNNVDid:CNNVD-201509-058date:2015-09-07T00:00:00
db:NVDid:CVE-2015-5986date:2015-09-05T02:59:04.367