Ubuntu: Bind vulnerability


 
Thread Tools Search this Thread
Special Forums Cybersecurity Security Advisories (RSS) Ubuntu: Bind vulnerability
# 1  
Old 12-07-2009
Ubuntu: Bind vulnerability

LinuxSecurity.com: Michael Sinatra discovered that Bind did not correctly validate certain records added to its cache. When DNSSEC validation is in use, a remote attacker could exploit this to spoof DNS entries and poison DNS caches. Among other things, this could lead to misdirected email and web traffic.

More...
Login or Register to Ask a Question

Previous Thread | Next Thread
Login or Register to Ask a Question
OSINFO-DB-VALIDATE.C(1) 				      Virtualization Support					   OSINFO-DB-VALIDATE.C(1)

NAME
osinfo-db-validate - Validate libosinfo XML data files SYNOPSIS
osinfo-db-validate [OPTIONS...] LOCAL-PATH1 [LOCAL-PATH2...] osinfo-db-validate [OPTIONS...] URI1 [URI2...] DESCRIPTION
Check that all files ("LOCAL-PATH1" or "URI1") comply with the libosinfo XML schema. The local path may point to a directory containing XML files, or directly to an XML file. The uris must point directly to remote XML files Any validation errors will be displayed on the console when detected. OPTIONS
-v, --verbose Display verbose progress information when validating files EXIT STATUS
The exit status will be 0 if all files passed validation, or 1 if a validation error was hit. SEE ALSO
xmllint(1) AUTHORS
Daniel P. Berrange <berrange@redhat.com> COPYRIGHT
Copyright (C) 2012 Red Hat, Inc. LICENSE
"osinfo-db-validate" is distributed under the termsof the GNU LGPL v2+ license. This is free software; see the source for copying conditions. There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE libosinfo-0.2.7 2013-02-26 OSINFO-DB-VALIDATE.C(1)