CVE-2015-8000

db.c in named in ISC BIND 9.x before 9.9.8-P2 and 9.10.x before 9.10.3-P2 allows remote attackers to cause a denial of service (REQUIRE assertion failure and daemon exit) via a malformed class attribute.
References
Link Resource
http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174143.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174145.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174252.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174520.html
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00027.html
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00028.html
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00036.html
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00042.html
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00033.html
http://marc.info/?l=bugtraq&m=145680832702035&w=2 Third Party Advisory
http://marc.info/?l=bugtraq&m=145680832702035&w=2 Third Party Advisory
http://packetstormsecurity.com/files/134882/FreeBSD-Security-Advisory-BIND-Denial-Of-Service.html
http://rhn.redhat.com/errata/RHSA-2015-2655.html
http://rhn.redhat.com/errata/RHSA-2015-2656.html
http://rhn.redhat.com/errata/RHSA-2015-2658.html
http://rhn.redhat.com/errata/RHSA-2016-0078.html
http://rhn.redhat.com/errata/RHSA-2016-0079.html
http://www.debian.org/security/2015/dsa-3420
http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html Third Party Advisory
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html Third Party Advisory
http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html Third Party Advisory
http://www.securityfocus.com/bid/79349
http://www.securitytracker.com/id/1034418
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.539966
http://www.ubuntu.com/usn/USN-2837-1
https://blogs.sophos.com/2016/02/17/utm-up2date-9-354-released/ Patch
https://blogs.sophos.com/2016/02/29/utm-up2date-9-319-released/ Patch
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04923105
https://kb.isc.org/article/AA-01317 Vendor Advisory
https://kb.isc.org/article/AA-01380 Vendor Advisory
https://kb.isc.org/article/AA-01438
http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174143.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174145.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174252.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174520.html
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00027.html
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00028.html
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00036.html
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00042.html
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00033.html
http://marc.info/?l=bugtraq&m=145680832702035&w=2 Third Party Advisory
http://marc.info/?l=bugtraq&m=145680832702035&w=2 Third Party Advisory
http://packetstormsecurity.com/files/134882/FreeBSD-Security-Advisory-BIND-Denial-Of-Service.html
http://rhn.redhat.com/errata/RHSA-2015-2655.html
http://rhn.redhat.com/errata/RHSA-2015-2656.html
http://rhn.redhat.com/errata/RHSA-2015-2658.html
http://rhn.redhat.com/errata/RHSA-2016-0078.html
http://rhn.redhat.com/errata/RHSA-2016-0079.html
http://www.debian.org/security/2015/dsa-3420
http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html Third Party Advisory
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html Third Party Advisory
http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html Third Party Advisory
http://www.securityfocus.com/bid/79349
http://www.securitytracker.com/id/1034418
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.539966
http://www.ubuntu.com/usn/USN-2837-1
https://blogs.sophos.com/2016/02/17/utm-up2date-9-354-released/ Patch
https://blogs.sophos.com/2016/02/29/utm-up2date-9-319-released/ Patch
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04923105
https://kb.isc.org/article/AA-01317 Vendor Advisory
https://kb.isc.org/article/AA-01380 Vendor Advisory
https://kb.isc.org/article/AA-01438
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*
cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*
cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*
cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
cpe:2.3:o:oracle:vm_server:3.2:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:isc:bind:8.4.7:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.0:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.0.1:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.1:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.1.1:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.1.2:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.1.3:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.2:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.2.0:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.2.1:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.2.2:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.2.2:p3:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.2.3:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.2.4:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.2.5:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.2.6:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.2.7:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.3:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.3.0:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.3.1:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.3.2:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.3.3:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.4:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.4.0:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.4.0:rc1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.4.1:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.4.2:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.4.3:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.4.3:rc1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.5:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.5.0:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.5.0:rc1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.5.1:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.5.1:rc1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.5.1:rc2:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.5.2:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.5.2:rc1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.5.3:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.5.3:rc1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.6:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.6:r5_p1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.6:r6_b1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.6:r6_rc1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.6:r6_rc2:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.6:r7_p1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.6:r7_p2:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.6:r9_p1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.6.0:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.6.0:p1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.6.0:rc1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.6.0:rc2:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.6.1:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.6.1:p1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.6.1:p2:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.6.1:p3:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.6.1:rc1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.6.2:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.6.2:rc1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.6.3:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.6.3:rc1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.7.0:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.7.0:b1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.7.0:p1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.7.0:p2:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.7.0:rc1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.7.0:rc2:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.7.1:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.7.1:p1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.7.1:p2:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.7.1:rc1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.7.2:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.7.2:p1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.7.2:p2:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.7.2:p3:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.7.2:rc1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.7.3:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.7.3:b1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.7.3:p1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.7.3:rc1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.7.4:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.7.4:b1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.7.4:p1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.7.4:rc1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.7.5:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.7.5:b1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.7.5:rc1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.7.5:rc2:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.7.6:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.7.6:p1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.7.6:p2:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.7.7:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.8.0:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.8.0:a1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.8.0:b1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.8.0:p1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.8.0:p2:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.8.0:p4:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.8.0:rc1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.8.1:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.8.1:b1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.8.1:b2:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.8.1:b3:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.8.1:p1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.8.1:rc1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.8.2:b1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.8.2:rc1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.8.2:rc2:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.8.3:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.8.3:p1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.8.3:p2:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.8.4:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.8.5:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.8.5:b1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.8.5:b2:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.8.5:p1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.8.5:p2:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.8.5:rc1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.8.5:rc2:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.8.6:b1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.8.6:rc1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.8.6:rc2:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.9.0:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.9.0:a1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.9.0:a2:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.9.0:a3:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.9.0:b1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.9.0:b2:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.9.0:rc1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.9.0:rc2:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.9.0:rc3:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.9.0:rc4:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.9.1:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.9.1:p1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.9.1:p2:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.9.2:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.9.3:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.9.3:b1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.9.3:b2:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.9.3:p1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.9.3:p2:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.9.3:rc1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.9.3:rc2:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.9.4:b1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.9.5:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.9.6:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.9.6:p1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.9.7:b1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.9.7:p1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.9.7:rc1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.9.7:rc2:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.9.8:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.9.8:rc1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.9.8:s1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.10.0:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.10.1:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.10.1:p1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.10.2:b1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.10.2:p1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.10.2:p2:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.10.2:p3:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.10.2:p4:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.10.2:rc1:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.10.3:*:*:*:*:*:*:*
cpe:2.3:a:isc:bind:9.10.3:rc1:*:*:*:*:*:*

History

21 Nov 2024, 02:37

Type Values Removed Values Added
References () http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174143.html - () http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174143.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174145.html - () http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174145.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174252.html - () http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174252.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174520.html - () http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174520.html -
References () http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00027.html - () http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00027.html -
References () http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00028.html - () http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00028.html -
References () http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00034.html - () http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00034.html -
References () http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00035.html - () http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00035.html -
References () http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00036.html - () http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00036.html -
References () http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00042.html - () http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00042.html -
References () http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00033.html - () http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00033.html -
References () http://marc.info/?l=bugtraq&m=145680832702035&w=2 - Third Party Advisory () http://marc.info/?l=bugtraq&m=145680832702035&w=2 - Third Party Advisory
References () http://packetstormsecurity.com/files/134882/FreeBSD-Security-Advisory-BIND-Denial-Of-Service.html - () http://packetstormsecurity.com/files/134882/FreeBSD-Security-Advisory-BIND-Denial-Of-Service.html -
References () http://rhn.redhat.com/errata/RHSA-2015-2655.html - () http://rhn.redhat.com/errata/RHSA-2015-2655.html -
References () http://rhn.redhat.com/errata/RHSA-2015-2656.html - () http://rhn.redhat.com/errata/RHSA-2015-2656.html -
References () http://rhn.redhat.com/errata/RHSA-2015-2658.html - () http://rhn.redhat.com/errata/RHSA-2015-2658.html -
References () http://rhn.redhat.com/errata/RHSA-2016-0078.html - () http://rhn.redhat.com/errata/RHSA-2016-0078.html -
References () http://rhn.redhat.com/errata/RHSA-2016-0079.html - () http://rhn.redhat.com/errata/RHSA-2016-0079.html -
References () http://www.debian.org/security/2015/dsa-3420 - () http://www.debian.org/security/2015/dsa-3420 -
References () http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html - Third Party Advisory () http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html - Third Party Advisory
References () http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html - Third Party Advisory () http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html - Third Party Advisory
References () http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html - Third Party Advisory () http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html - Third Party Advisory
References () http://www.securityfocus.com/bid/79349 - () http://www.securityfocus.com/bid/79349 -
References () http://www.securitytracker.com/id/1034418 - () http://www.securitytracker.com/id/1034418 -
References () http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.539966 - () http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.539966 -
References () http://www.ubuntu.com/usn/USN-2837-1 - () http://www.ubuntu.com/usn/USN-2837-1 -
References () https://blogs.sophos.com/2016/02/17/utm-up2date-9-354-released/ - Patch () https://blogs.sophos.com/2016/02/17/utm-up2date-9-354-released/ - Patch
References () https://blogs.sophos.com/2016/02/29/utm-up2date-9-319-released/ - Patch () https://blogs.sophos.com/2016/02/29/utm-up2date-9-319-released/ - Patch
References () https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04923105 - () https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04923105 -
References () https://kb.isc.org/article/AA-01317 - Vendor Advisory () https://kb.isc.org/article/AA-01317 - Vendor Advisory
References () https://kb.isc.org/article/AA-01380 - Vendor Advisory () https://kb.isc.org/article/AA-01380 - Vendor Advisory
References () https://kb.isc.org/article/AA-01438 - () https://kb.isc.org/article/AA-01438 -

Information

Published : 2015-12-16 15:59

Updated : 2024-11-21 02:37


NVD link : CVE-2015-8000

Mitre link : CVE-2015-8000

CVE.ORG link : CVE-2015-8000


JSON object : View

Products Affected

oracle

  • vm_server
  • solaris
  • linux

isc

  • bind
CWE
CWE-20

Improper Input Validation