Oval Definition:oval:org.mitre.oval:tst:2624
Comment:in.named running
Type:process_testNamespace:unix
Check_Existence:at_least_one_existsCheck:at least one
State Operator:AND
References
Object:oval:org.mitre.oval:obj:1496
Referencing Definitions
Definition IDClassTitleLast Modified
oval:org.mitre.oval:def:449
V
Bind OPT Resource Record DoS Vulnerability
2005-03-09
oval:org.mitre.oval:def:2011
V
ISC BIND Cache Poison Denial Of Service
2005-02-16
oval:org.mitre.oval:def:2094
V
BIND DoS via SIG RR Elements
2005-03-09
oval:org.mitre.oval:def:2154
V
Security Vulnerability in BIND 8 May Allow Cache Poisoning Attack
2007-11-19
oval:org.mitre.oval:def:2539
V
BIND SIG Resource Records Buffer Overflow
2005-03-09
oval:org.mitre.oval:def:3960
V
in.named Process Crash Vulnerability
2005-06-01
oval:org.mitre.oval:def:5917
V
Security Vulnerability in the DNS Protocol May Lead to DNS Cache Poisoning
2009-10-05
oval:org.mitre.oval:def:7430
V
A vulnerability in the way named(1M) handles recursive client queries may allow a remote unprivileged user to cause named(1M) to return NXDOMAIN (Non-Existent Domain) for Internet hosts thus causing a Denial of Service (DoS) for those hosts to end users
2010-06-14
oval:org.mitre.oval:def:7459
V
Security Vulnerability in BIND DNS Software Shipped With Solaris May Allow DNS Cache Poisoning
2010-06-14
BACK