mirror of
https://git.FreeBSD.org/ports.git
synced 2024-12-13 03:03:15 +00:00
83aa56c48f
1. The default access control lists (acls) are not being correctly set. If not set anyone can make recursive queries and/or query the cache contents. See also: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2925 2. The DNS query id generation is vulnerable to cryptographic analysis which provides a 1 in 8 chance of guessing the next query id for 50% of the query ids. This can be used to perform cache poisoning by an attacker. This bug only affects outgoing queries, generated by BIND 9 to answer questions as a resolver, or when it is looking up data for internal uses, such as when sending NOTIFYs to slave name servers. All users are encouraged to upgrade. See also: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2926
7 lines
402 B
Plaintext
7 lines
402 B
Plaintext
MD5 (bind-9.4.1-P1.tar.gz) = 44e0514e6105ddaa235394045d9aeb0c
|
|
SHA256 (bind-9.4.1-P1.tar.gz) = 912d07be9a6b4fa180d38637bf32ac4e802b087e46fbbf2a76314ecc3444b693
|
|
SIZE (bind-9.4.1-P1.tar.gz) = 6341409
|
|
MD5 (bind-9.4.1-P1.tar.gz.asc) = 2d93fd12d3aa9895c23c09784f7fe0b7
|
|
SHA256 (bind-9.4.1-P1.tar.gz.asc) = b66a7ad4a8dd2a375fb961ab9b8a744fa55b034c0b7233b4490b6351e36f5030
|
|
SIZE (bind-9.4.1-P1.tar.gz.asc) = 478
|