WID-SEC-W-2024-0386

Vulnerability from csaf_certbund - Published: 2024-02-13 23:00 - Updated: 2025-06-04 22:00
Summary
Internet Systems Consortium BIND: Mehrere Schwachstellen ermöglichen Denial of Service
Severity
Mittel
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung: BIND (Berkeley Internet Name Domain) ist ein Open-Source-Softwarepaket, das einen Domain-Name-System-Server implementiert.
Angriff: Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Internet Systems Consortium BIND ausnutzen, um einen Denial of Service Angriff durchzuführen.
Betroffene Betriebssysteme: - Linux - Sonstiges
References
https://wid.cert-bund.de/.well-known/csaf/white/2… self
https://wid.cert-bund.de/portal/wid/securityadvis… self
https://kb.isc.org/docs/cve-2023-4408 external
https://kb.isc.org/docs/cve-2023-5517 external
https://kb.isc.org/docs/cve-2023-5679 external
https://kb.isc.org/docs/cve-2023-5680 external
https://kb.isc.org/docs/cve-2023-6516 external
https://kb.isc.org/docs/cve-2023-50387 external
https://kb.isc.org/docs/cve-2023-50868 external
https://kb.isc.org/docs/cve-2023-56808 external
https://lists.debian.org/debian-security-announce… external
https://bodhi.fedoraproject.org/updates/FEDORA-20… external
https://bodhi.fedoraproject.org/updates/FEDORA-20… external
https://lists.debian.org/debian-security-announce… external
https://bodhi.fedoraproject.org/updates/FEDORA-20… external
https://bodhi.fedoraproject.org/updates/FEDORA-20… external
https://bodhi.fedoraproject.org/updates/FEDORA-20… external
https://bodhi.fedoraproject.org/updates/FEDORA-20… external
https://bodhi.fedoraproject.org/updates/FEDORA-20… external
https://bodhi.fedoraproject.org/updates/FEDORA-EP… external
https://bodhi.fedoraproject.org/updates/FEDORA-EP… external
https://docs.powerdns.com/recursor/security-advis… external
https://support.infoblox.com/s/article/000009609 external
https://bodhi.fedoraproject.org/updates/FEDORA-20… external
https://bodhi.fedoraproject.org/updates/FEDORA-20… external
https://lists.debian.org/debian-security-announce… external
https://bodhi.fedoraproject.org/updates/FEDORA-20… external
https://bodhi.fedoraproject.org/updates/FEDORA-20… external
https://bodhi.fedoraproject.org/updates/FEDORA-20… external
https://ubuntu.com/security/notices/USN-6642-1 external
https://lists.suse.com/pipermail/sle-security-upd… external
https://lists.debian.org/debian-lts-announce/2024… external
https://lists.suse.com/pipermail/sle-security-upd… external
https://access.redhat.com/errata/RHSA-2024:0965 external
https://access.redhat.com/errata/RHSA-2024:0977 external
https://access.redhat.com/errata/RHSA-2024:0982 external
https://access.redhat.com/errata/RHSA-2024:0981 external
https://lists.debian.org/debian-security-announce… external
https://linux.oracle.com/errata/ELSA-2024-0977.html external
https://linux.oracle.com/errata/ELSA-2024-0965.html external
https://ubuntu.com/security/notices/USN-6665-1 external
https://alas.aws.amazon.com/AL2/ALAS-2024-2481.html external
https://access.redhat.com/errata/RHSA-2024:1335 external
https://access.redhat.com/errata/RHSA-2024:1334 external
http://linux.oracle.com/errata/ELSA-2024-1334.html external
http://linux.oracle.com/errata/ELSA-2024-1335.html external
https://lists.debian.org/debian-security-announce… external
https://my.f5.com/manage/s/article/K000138990 external
https://access.redhat.com/errata/RHSA-2024:1522 external
https://errata.build.resf.org/RLSA-2024:1335 external
https://access.redhat.com/errata/RHSA-2024:1544 external
https://access.redhat.com/errata/RHSA-2024:1543 external
https://security.FreeBSD.org/advisories/FreeBSD-S… external
https://access.redhat.com/errata/RHSA-2024:1545 external
https://access.redhat.com/errata/RHSA-2024:1648 external
https://access.redhat.com/errata/RHSA-2024:1647 external
https://ubuntu.com/security/notices/USN-6723-1 external
https://access.redhat.com/errata/RHSA-2024:1781 external
https://access.redhat.com/errata/RHSA-2024:1782 external
https://access.redhat.com/errata/RHSA-2024:1789 external
https://linux.oracle.com/errata/ELSA-2024-1789.html external
https://linux.oracle.com/errata/ELSA-2024-1782.html external
https://linux.oracle.com/errata/ELSA-2024-1781.html external
https://access.redhat.com/errata/RHSA-2024:1803 external
https://access.redhat.com/errata/RHSA-2024:1800 external
https://access.redhat.com/errata/RHSA-2024:1801 external
https://access.redhat.com/errata/RHSA-2024:1804 external
https://alas.aws.amazon.com/AL2/ALASDNSMASQ-2024-… external
https://ubuntu.com/security/notices/USN-6657-2 external
https://alas.aws.amazon.com/AL2/ALAS-2024-2530.html external
https://access.redhat.com/errata/RHSA-2024:2587 external
https://access.redhat.com/errata/RHSA-2024:2551 external
https://access.redhat.com/errata/RHSA-2024:2696 external
https://errata.build.resf.org/RLSA-2024:1781 external
https://errata.build.resf.org/RLBA-2024:1798 external
https://errata.build.resf.org/RLSA-2024:1782 external
https://access.redhat.com/errata/RHSA-2024:2720 external
https://access.redhat.com/errata/RHSA-2024:2721 external
https://linux.oracle.com/errata/ELSA-2024-2551.html external
https://access.redhat.com/errata/RHSA-2024:2821 external
https://access.redhat.com/errata/RHSA-2024:2890 external
https://lists.debian.org/debian-lts-announce/2024… external
https://access.redhat.com/errata/RHSA-2024:3267 external
https://access.redhat.com/errata/RHSA-2024:3271 external
http://linux.oracle.com/errata/ELSA-2024-3271.html external
https://lists.suse.com/pipermail/sle-security-upd… external
https://lists.suse.com/pipermail/sle-security-upd… external
https://www.ibm.com/support/pages/node/7156443 external
https://access.redhat.com/errata/RHSA-2024:3741 external
https://linux.oracle.com/errata/ELSA-2024-3741.html external
https://lists.suse.com/pipermail/sle-security-upd… external
https://lists.suse.com/pipermail/sle-security-upd… external
https://access.redhat.com/errata/RHSA-2024:3877 external
https://access.redhat.com/errata/RHSA-2024:3929 external
https://lists.suse.com/pipermail/sle-security-upd… external
https://www.dell.com/support/kbdoc/de-de/00022663… external
https://lists.suse.com/pipermail/sle-security-upd… external
https://www.dell.com/support/kbdoc/de-de/00022757… external
https://linux.oracle.com/errata/ELSA-2024-5231.html external
https://linux.oracle.com/errata/ELSA-2024-5390.html external
https://alas.aws.amazon.com/AL2/ALAS-2024-2625.html external
https://lists.debian.org/debian-lts-announce/2024… external
https://www.dell.com/support/kbdoc/de-de/00023067… external
https://securitydocs.business.xerox.com/wp-conten… external
https://lists.debian.org/debian-lts-announce/2024… external
https://security.gentoo.org/glsa/202412-10 external
https://access.redhat.com/errata/RHSA-2024:11003 external
https://linux.oracle.com/errata/ELSA-2024-11232.html external
https://access.redhat.com/errata/RHSA-2025:0039 external
https://supportportal.juniper.net/s/article/2025-… external
https://lists.opensuse.org/archives/list/security… external
https://lists.suse.com/pipermail/sle-security-upd… external
https://linux.oracle.com/errata/ELSA-2024-11003.html external
https://www.ibm.com/support/pages/node/7183474 external
https://alas.aws.amazon.com/AL2/ALASUNBOUND-1.17-… external
https://supportportal.juniper.net/s/article/2025-… external
https://lists.suse.com/pipermail/sle-security-upd… external

{
  "document": {
    "aggregate_severity": {
      "text": "mittel"
    },
    "category": "csaf_base",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "de-DE",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
      },
      {
        "category": "description",
        "text": "BIND (Berkeley Internet Name Domain) ist ein Open-Source-Softwarepaket, das einen Domain-Name-System-Server implementiert.",
        "title": "Produktbeschreibung"
      },
      {
        "category": "summary",
        "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Internet Systems Consortium BIND ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren.",
        "title": "Angriff"
      },
      {
        "category": "general",
        "text": "- Linux\n- Sonstiges",
        "title": "Betroffene Betriebssysteme"
      }
    ],
    "publisher": {
      "category": "other",
      "contact_details": "csaf-provider@cert-bund.de",
      "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "namespace": "https://www.bsi.bund.de"
    },
    "references": [
      {
        "category": "self",
        "summary": "WID-SEC-W-2024-0386 - CSAF Version",
        "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0386.json"
      },
      {
        "category": "self",
        "summary": "WID-SEC-2024-0386 - Portal Version",
        "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0386"
      },
      {
        "category": "external",
        "summary": "BIND Security Advisory vom 2024-02-13",
        "url": "https://kb.isc.org/docs/cve-2023-4408"
      },
      {
        "category": "external",
        "summary": "ISC Advisory",
        "url": "https://kb.isc.org/docs/cve-2023-5517"
      },
      {
        "category": "external",
        "summary": "ISC Advisory",
        "url": "https://kb.isc.org/docs/cve-2023-5679"
      },
      {
        "category": "external",
        "summary": "ISC Advisory",
        "url": "https://kb.isc.org/docs/cve-2023-5680"
      },
      {
        "category": "external",
        "summary": "ISC Advisory",
        "url": "https://kb.isc.org/docs/cve-2023-6516"
      },
      {
        "category": "external",
        "summary": "ISC Advisory",
        "url": "https://kb.isc.org/docs/cve-2023-50387"
      },
      {
        "category": "external",
        "summary": "ISC Advisory",
        "url": "https://kb.isc.org/docs/cve-2023-50868"
      },
      {
        "category": "external",
        "summary": "ISC Advisory",
        "url": "https://kb.isc.org/docs/cve-2023-56808"
      },
      {
        "category": "external",
        "summary": "Debian Security Advisory DSA-5620 vom 2024-02-14",
        "url": "https://lists.debian.org/debian-security-announce/2024/msg00027.html"
      },
      {
        "category": "external",
        "summary": "Fedora Security Advisory FEDORA-2024-C967C7D287 vom 2024-02-14",
        "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-c967c7d287"
      },
      {
        "category": "external",
        "summary": "Fedora Security Advisory FEDORA-2024-E24211EFF0 vom 2024-02-14",
        "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-e24211eff0"
      },
      {
        "category": "external",
        "summary": "Debian Security Advisory DSA-5621 vom 2024-02-14",
        "url": "https://lists.debian.org/debian-security-announce/2024/msg00028.html"
      },
      {
        "category": "external",
        "summary": "Fedora Security Advisory FEDORA-2024-E00ECEB11C vom 2024-02-14",
        "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-e00eceb11c"
      },
      {
        "category": "external",
        "summary": "Fedora Security Advisory FEDORA-2024-B0F9656A76 vom 2024-02-14",
        "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-b0f9656a76"
      },
      {
        "category": "external",
        "summary": "Fedora Security Advisory FEDORA-2024-08BD07FBEB vom 2024-02-15",
        "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-08bd07fbeb"
      },
      {
        "category": "external",
        "summary": "Fedora Security Advisory FEDORA-2024-4E36DF9DFD vom 2024-02-14",
        "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-4e36df9dfd"
      },
      {
        "category": "external",
        "summary": "Fedora Security Advisory FEDORA-2024-2E26ECCFCB vom 2024-02-15",
        "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-2e26eccfcb"
      },
      {
        "category": "external",
        "summary": "Fedora Security Advisory FEDORA-EPEL-2024-0B7BA715AF vom 2024-02-14",
        "url": "https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2024-0b7ba715af"
      },
      {
        "category": "external",
        "summary": "Fedora Security Advisory FEDORA-EPEL-2024-4F0DBC2B30 vom 2024-02-14",
        "url": "https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2024-4f0dbc2b30"
      },
      {
        "category": "external",
        "summary": "PowerDNS Security Advisory",
        "url": "https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2024-01.html"
      },
      {
        "category": "external",
        "summary": "Infoblox Security Advisory",
        "url": "https://support.infoblox.com/s/article/000009609"
      },
      {
        "category": "external",
        "summary": "Fedora Security Advisory FEDORA-2024-499B9BE35F vom 2024-02-17",
        "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-499b9be35f"
      },
      {
        "category": "external",
        "summary": "Fedora Security Advisory FEDORA-2024-7378BE30DD vom 2024-02-17",
        "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-7378be30dd"
      },
      {
        "category": "external",
        "summary": "Debian Security Advisory DSA-5626 vom 2024-02-18",
        "url": "https://lists.debian.org/debian-security-announce/2024/msg00033.html"
      },
      {
        "category": "external",
        "summary": "Fedora Security Advisory FEDORA-2024-FAE88B73EB vom 2024-02-17",
        "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-fae88b73eb"
      },
      {
        "category": "external",
        "summary": "Fedora Security Advisory FEDORA-2024-21310568FA vom 2024-02-17",
        "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-21310568fa"
      },
      {
        "category": "external",
        "summary": "Fedora Security Advisory FEDORA-2024-C36C448396 vom 2024-02-17",
        "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-c36c448396"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-6642-1 vom 2024-02-19",
        "url": "https://ubuntu.com/security/notices/USN-6642-1"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2024:0574-1 vom 2024-02-21",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-February/017984.html"
      },
      {
        "category": "external",
        "summary": "Debian Security Advisory DLA-3736 vom 2024-02-21",
        "url": "https://lists.debian.org/debian-lts-announce/2024/02/msg00006.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2024:0590-1 vom 2024-02-22",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-February/017996.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:0965 vom 2024-02-26",
        "url": "https://access.redhat.com/errata/RHSA-2024:0965"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:0977 vom 2024-02-26",
        "url": "https://access.redhat.com/errata/RHSA-2024:0977"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:0982 vom 2024-02-26",
        "url": "https://access.redhat.com/errata/RHSA-2024:0982"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:0981 vom 2024-02-26",
        "url": "https://access.redhat.com/errata/RHSA-2024:0981"
      },
      {
        "category": "external",
        "summary": "Debian Security Advisory DSA-5633 vom 2024-02-28",
        "url": "https://lists.debian.org/debian-security-announce/2024/msg00039.html"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2024-0977 vom 2024-02-28",
        "url": "https://linux.oracle.com/errata/ELSA-2024-0977.html"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2024-0965 vom 2024-02-28",
        "url": "https://linux.oracle.com/errata/ELSA-2024-0965.html"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-6665-1 vom 2024-02-28",
        "url": "https://ubuntu.com/security/notices/USN-6665-1"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALAS-2024-2481 vom 2024-03-05",
        "url": "https://alas.aws.amazon.com/AL2/ALAS-2024-2481.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:1335 vom 2024-03-14",
        "url": "https://access.redhat.com/errata/RHSA-2024:1335"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:1334 vom 2024-03-14",
        "url": "https://access.redhat.com/errata/RHSA-2024:1334"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2024-1334 vom 2024-03-16",
        "url": "http://linux.oracle.com/errata/ELSA-2024-1334.html"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2024-1335 vom 2024-03-16",
        "url": "http://linux.oracle.com/errata/ELSA-2024-1335.html"
      },
      {
        "category": "external",
        "summary": "Debian Security Advisory DSA-5642 vom 2024-03-20",
        "url": "https://lists.debian.org/debian-security-announce/2024/msg00050.html"
      },
      {
        "category": "external",
        "summary": "F5 Security Advisory K000138990 vom 2024-03-26",
        "url": "https://my.f5.com/manage/s/article/K000138990"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:1522 vom 2024-03-26",
        "url": "https://access.redhat.com/errata/RHSA-2024:1522"
      },
      {
        "category": "external",
        "summary": "Rocky Linux Security Advisory RLSA-2024:1335 vom 2024-03-27",
        "url": "https://errata.build.resf.org/RLSA-2024:1335"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:1544 vom 2024-03-27",
        "url": "https://access.redhat.com/errata/RHSA-2024:1544"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:1543 vom 2024-03-27",
        "url": "https://access.redhat.com/errata/RHSA-2024:1543"
      },
      {
        "category": "external",
        "summary": "FreeBSD Security Advisory FREEBSD-SA-24:03.UNBOUND vom 2024-03-28",
        "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-24:03.unbound.asc"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:1545 vom 2024-03-27",
        "url": "https://access.redhat.com/errata/RHSA-2024:1545"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:1648 vom 2024-04-02",
        "url": "https://access.redhat.com/errata/RHSA-2024:1648"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:1647 vom 2024-04-02",
        "url": "https://access.redhat.com/errata/RHSA-2024:1647"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-6723-1 vom 2024-04-09",
        "url": "https://ubuntu.com/security/notices/USN-6723-1"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:1781 vom 2024-04-11",
        "url": "https://access.redhat.com/errata/RHSA-2024:1781"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:1782 vom 2024-04-11",
        "url": "https://access.redhat.com/errata/RHSA-2024:1782"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:1789 vom 2024-04-11",
        "url": "https://access.redhat.com/errata/RHSA-2024:1789"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2024-1789 vom 2024-04-12",
        "url": "https://linux.oracle.com/errata/ELSA-2024-1789.html"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2024-1782 vom 2024-04-12",
        "url": "https://linux.oracle.com/errata/ELSA-2024-1782.html"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2024-1781 vom 2024-04-12",
        "url": "https://linux.oracle.com/errata/ELSA-2024-1781.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:1803 vom 2024-04-15",
        "url": "https://access.redhat.com/errata/RHSA-2024:1803"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:1800 vom 2024-04-15",
        "url": "https://access.redhat.com/errata/RHSA-2024:1800"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:1801 vom 2024-04-15",
        "url": "https://access.redhat.com/errata/RHSA-2024:1801"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:1804 vom 2024-04-15",
        "url": "https://access.redhat.com/errata/RHSA-2024:1804"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALASDNSMASQ-2024-002 vom 2024-04-18",
        "url": "https://alas.aws.amazon.com/AL2/ALASDNSMASQ-2024-002.html"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-6657-2 vom 2024-04-24",
        "url": "https://ubuntu.com/security/notices/USN-6657-2"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALAS-2024-2530 vom 2024-04-29",
        "url": "https://alas.aws.amazon.com/AL2/ALAS-2024-2530.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:2587 vom 2024-04-30",
        "url": "https://access.redhat.com/errata/RHSA-2024:2587"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:2551 vom 2024-04-30",
        "url": "https://access.redhat.com/errata/RHSA-2024:2551"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:2696 vom 2024-05-06",
        "url": "https://access.redhat.com/errata/RHSA-2024:2696"
      },
      {
        "category": "external",
        "summary": "Rocky Linux Security Advisory RLSA-2024:1781 vom 2024-05-06",
        "url": "https://errata.build.resf.org/RLSA-2024:1781"
      },
      {
        "category": "external",
        "summary": "Rocky Linux Security Advisory RLBA-2024:1798 vom 2024-05-06",
        "url": "https://errata.build.resf.org/RLBA-2024:1798"
      },
      {
        "category": "external",
        "summary": "Rocky Linux Security Advisory RLSA-2024:1782 vom 2024-05-06",
        "url": "https://errata.build.resf.org/RLSA-2024:1782"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:2720 vom 2024-05-07",
        "url": "https://access.redhat.com/errata/RHSA-2024:2720"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:2721 vom 2024-05-07",
        "url": "https://access.redhat.com/errata/RHSA-2024:2721"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2024-2551 vom 2024-05-08",
        "url": "https://linux.oracle.com/errata/ELSA-2024-2551.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:2821 vom 2024-05-13",
        "url": "https://access.redhat.com/errata/RHSA-2024:2821"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:2890 vom 2024-05-16",
        "url": "https://access.redhat.com/errata/RHSA-2024:2890"
      },
      {
        "category": "external",
        "summary": "Debian Security Advisory DLA-3816 vom 2024-05-17",
        "url": "https://lists.debian.org/debian-lts-announce/2024/05/msg00011.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:3267 vom 2024-05-22",
        "url": "https://access.redhat.com/errata/RHSA-2024:3267"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:3271 vom 2024-05-22",
        "url": "https://access.redhat.com/errata/RHSA-2024:3271"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2024-3271 vom 2024-05-30",
        "url": "http://linux.oracle.com/errata/ELSA-2024-3271.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2024:1894-1 vom 2024-06-03",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-June/018640.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2024:1923-1 vom 2024-06-04",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-June/018654.html"
      },
      {
        "category": "external",
        "summary": "IBM Security Bulletin 7156443 vom 2024-06-05",
        "url": "https://www.ibm.com/support/pages/node/7156443"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:3741 vom 2024-06-10",
        "url": "https://access.redhat.com/errata/RHSA-2024:3741"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2024-3741 vom 2024-06-11",
        "url": "https://linux.oracle.com/errata/ELSA-2024-3741.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2024:1991-1 vom 2024-06-11",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-June/018692.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2024:1982-1 vom 2024-06-11",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-June/018701.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:3877 vom 2024-06-13",
        "url": "https://access.redhat.com/errata/RHSA-2024:3877"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:3929 vom 2024-06-14",
        "url": "https://access.redhat.com/errata/RHSA-2024:3929"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2024:2033-1 vom 2024-06-17",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-June/018731.html"
      },
      {
        "category": "external",
        "summary": "Dell Security Advisory DSA-2024-022 vom 2024-07-03",
        "url": "https://www.dell.com/support/kbdoc/de-de/000226633/dsa-2024-022-security-update-for-dell-networker-vproxy-multiple-component-vulnerabilities"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2024:1991-2 vom 2024-08-01",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019081.html"
      },
      {
        "category": "external",
        "summary": "Dell Security Advisory DSA-2024-348 vom 2024-08-06",
        "url": "https://www.dell.com/support/kbdoc/de-de/000227573/dsa-2024-348-security-update-for-dell-avamar-dell-networker-virtual-edition-nve-and-dell-powerprotect-dp-series-appliance-dell-integrated-data-protection-appliance-idpa-security-update-for-multiple-vulnerabilities"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2024-5231 vom 2024-08-13",
        "url": "https://linux.oracle.com/errata/ELSA-2024-5231.html"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2024-5390 vom 2024-08-14",
        "url": "https://linux.oracle.com/errata/ELSA-2024-5390.html"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALAS-2024-2625 vom 2024-08-21",
        "url": "https://alas.aws.amazon.com/AL2/ALAS-2024-2625.html"
      },
      {
        "category": "external",
        "summary": "Debian Security Advisory DLA-3859 vom 2024-09-02",
        "url": "https://lists.debian.org/debian-lts-announce/2024/09/msg00001.html"
      },
      {
        "category": "external",
        "summary": "Dell Security Advisory DSA-2024-412 vom 2024-09-30",
        "url": "https://www.dell.com/support/kbdoc/de-de/000230678/dsa-2024-412-security-update-for-dell-ecs-3-8-1-2-multiple-third-party-component-vulnerabilities"
      },
      {
        "category": "external",
        "summary": "XEROX Security Advisory XRX24-017 vom 2024-11-21",
        "url": "https://securitydocs.business.xerox.com/wp-content/uploads/2024/11/Xerox-Security-Bulletin-XRX24-017-for-Xerox%C2%AE-FreeFlow%C2%AE-Print-Server-v9.pdf"
      },
      {
        "category": "external",
        "summary": "Debian Security Advisory DLA-3974 vom 2024-11-30",
        "url": "https://lists.debian.org/debian-lts-announce/2024/11/msg00035.html"
      },
      {
        "category": "external",
        "summary": "Gentoo Linux Security Advisory GLSA-202412-10 vom 2024-12-07",
        "url": "https://security.gentoo.org/glsa/202412-10"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:11003 vom 2024-12-12",
        "url": "https://access.redhat.com/errata/RHSA-2024:11003"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2024-11232 vom 2024-12-19",
        "url": "https://linux.oracle.com/errata/ELSA-2024-11232.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:0039 vom 2025-01-06",
        "url": "https://access.redhat.com/errata/RHSA-2025:0039"
      },
      {
        "category": "external",
        "summary": "Juniper Security Advisory JSA92874 vom 2024-01-09",
        "url": "https://supportportal.juniper.net/s/article/2025-01-Security-Bulletin-Junos-Space-Multiple-vulnerabilities-resolved-in-24-1R2-release"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:0071-1 vom 2025-01-10",
        "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/DEKEI5FJUPSMQTBELI6LN6TJE2OPRJLZ/"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:0130-1 vom 2025-01-15",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020139.html"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2024-11003 vom 2025-01-28",
        "url": "https://linux.oracle.com/errata/ELSA-2024-11003.html"
      },
      {
        "category": "external",
        "summary": "IBM Security Bulletin 7183474 vom 2025-02-26",
        "url": "https://www.ibm.com/support/pages/node/7183474"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALASUNBOUND-1.17-2025-004 vom 2025-03-26",
        "url": "https://alas.aws.amazon.com/AL2/ALASUNBOUND-1.17-2025-004.html"
      },
      {
        "category": "external",
        "summary": "Juniper Security Bulletin",
        "url": "https://supportportal.juniper.net/s/article/2025-01-Security-Bulletin-Junos-Space-Multiple-vulnerabilities-resolved-in-24-1R2-release?language=en_US"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2025:20024-1 vom 2025-06-04",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021370.html"
      }
    ],
    "source_lang": "en-US",
    "title": "Internet Systems Consortium BIND: Mehrere Schwachstellen erm\u00f6glichen Denial of Service",
    "tracking": {
      "current_release_date": "2025-06-04T22:00:00.000+00:00",
      "generator": {
        "date": "2025-06-05T06:06:55.543+00:00",
        "engine": {
          "name": "BSI-WID",
          "version": "1.3.12"
        }
      },
      "id": "WID-SEC-W-2024-0386",
      "initial_release_date": "2024-02-13T23:00:00.000+00:00",
      "revision_history": [
        {
          "date": "2024-02-13T23:00:00.000+00:00",
          "number": "1",
          "summary": "Initiale Fassung"
        },
        {
          "date": "2024-02-14T23:00:00.000+00:00",
          "number": "2",
          "summary": "Neue Updates von Fedora aufgenommen"
        },
        {
          "date": "2024-02-18T23:00:00.000+00:00",
          "number": "3",
          "summary": "Neue Updates von Fedora und Debian aufgenommen"
        },
        {
          "date": "2024-02-19T23:00:00.000+00:00",
          "number": "4",
          "summary": "Neue Updates von Ubuntu aufgenommen"
        },
        {
          "date": "2024-02-21T23:00:00.000+00:00",
          "number": "5",
          "summary": "Neue Updates von SUSE und Debian aufgenommen"
        },
        {
          "date": "2024-02-22T23:00:00.000+00:00",
          "number": "6",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2024-02-25T23:00:00.000+00:00",
          "number": "7",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2024-02-27T23:00:00.000+00:00",
          "number": "8",
          "summary": "Neue Updates von Debian und Oracle Linux aufgenommen"
        },
        {
          "date": "2024-02-28T23:00:00.000+00:00",
          "number": "9",
          "summary": "Neue Updates von Oracle Linux und Ubuntu aufgenommen"
        },
        {
          "date": "2024-03-04T23:00:00.000+00:00",
          "number": "10",
          "summary": "Neue Updates von Amazon aufgenommen"
        },
        {
          "date": "2024-03-14T23:00:00.000+00:00",
          "number": "11",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2024-03-17T23:00:00.000+00:00",
          "number": "12",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        },
        {
          "date": "2024-03-18T23:00:00.000+00:00",
          "number": "13",
          "summary": "doppelten Eintrag entfernt"
        },
        {
          "date": "2024-03-20T23:00:00.000+00:00",
          "number": "14",
          "summary": "Neue Updates von Debian aufgenommen"
        },
        {
          "date": "2024-03-25T23:00:00.000+00:00",
          "number": "15",
          "summary": "Neue Updates von F5 aufgenommen"
        },
        {
          "date": "2024-03-26T23:00:00.000+00:00",
          "number": "16",
          "summary": "Neue Updates von Red Hat und Rocky Enterprise Software Foundation aufgenommen"
        },
        {
          "date": "2024-03-27T23:00:00.000+00:00",
          "number": "17",
          "summary": "Neue Updates von Red Hat und FreeBSD aufgenommen"
        },
        {
          "date": "2024-04-02T22:00:00.000+00:00",
          "number": "18",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2024-04-09T22:00:00.000+00:00",
          "number": "19",
          "summary": "Neue Updates von Ubuntu aufgenommen"
        },
        {
          "date": "2024-04-10T22:00:00.000+00:00",
          "number": "20",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2024-04-11T22:00:00.000+00:00",
          "number": "21",
          "summary": "Neue Updates von Red Hat und Oracle Linux aufgenommen"
        },
        {
          "date": "2024-04-14T22:00:00.000+00:00",
          "number": "22",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2024-04-17T22:00:00.000+00:00",
          "number": "23",
          "summary": "Neue Updates von Amazon aufgenommen"
        },
        {
          "date": "2024-04-21T22:00:00.000+00:00",
          "number": "24",
          "summary": "Link korrigiert"
        },
        {
          "date": "2024-04-24T22:00:00.000+00:00",
          "number": "25",
          "summary": "Neue Updates von Ubuntu aufgenommen"
        },
        {
          "date": "2024-04-29T22:00:00.000+00:00",
          "number": "26",
          "summary": "Neue Updates von Amazon aufgenommen"
        },
        {
          "date": "2024-05-01T22:00:00.000+00:00",
          "number": "27",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2024-05-05T22:00:00.000+00:00",
          "number": "28",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2024-05-06T22:00:00.000+00:00",
          "number": "29",
          "summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen"
        },
        {
          "date": "2024-05-07T22:00:00.000+00:00",
          "number": "30",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        },
        {
          "date": "2024-05-12T22:00:00.000+00:00",
          "number": "31",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2024-05-16T22:00:00.000+00:00",
          "number": "32",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2024-05-20T22:00:00.000+00:00",
          "number": "33",
          "summary": "Neue Updates von Debian aufgenommen"
        },
        {
          "date": "2024-05-21T22:00:00.000+00:00",
          "number": "34",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2024-05-30T22:00:00.000+00:00",
          "number": "35",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        },
        {
          "date": "2024-06-02T22:00:00.000+00:00",
          "number": "36",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2024-06-04T22:00:00.000+00:00",
          "number": "37",
          "summary": "Neue Updates von SUSE und IBM aufgenommen"
        },
        {
          "date": "2024-06-10T22:00:00.000+00:00",
          "number": "38",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2024-06-11T22:00:00.000+00:00",
          "number": "39",
          "summary": "Neue Updates von Oracle Linux und SUSE aufgenommen"
        },
        {
          "date": "2024-06-12T22:00:00.000+00:00",
          "number": "40",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2024-06-13T22:00:00.000+00:00",
          "number": "41",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2024-06-16T22:00:00.000+00:00",
          "number": "42",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2024-07-02T22:00:00.000+00:00",
          "number": "43",
          "summary": "Neue Updates von Dell aufgenommen"
        },
        {
          "date": "2024-07-31T22:00:00.000+00:00",
          "number": "44",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2024-08-05T22:00:00.000+00:00",
          "number": "45",
          "summary": "Neue Updates von Dell aufgenommen"
        },
        {
          "date": "2024-08-13T22:00:00.000+00:00",
          "number": "46",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        },
        {
          "date": "2024-08-14T22:00:00.000+00:00",
          "number": "47",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        },
        {
          "date": "2024-08-20T22:00:00.000+00:00",
          "number": "48",
          "summary": "Neue Updates von Amazon aufgenommen"
        },
        {
          "date": "2024-09-02T22:00:00.000+00:00",
          "number": "49",
          "summary": "Neue Updates von Debian aufgenommen"
        },
        {
          "date": "2024-09-30T22:00:00.000+00:00",
          "number": "50",
          "summary": "Neue Updates von Dell aufgenommen"
        },
        {
          "date": "2024-11-21T23:00:00.000+00:00",
          "number": "51",
          "summary": "Neue Updates von XEROX aufgenommen"
        },
        {
          "date": "2024-12-01T23:00:00.000+00:00",
          "number": "52",
          "summary": "Neue Updates von Debian aufgenommen"
        },
        {
          "date": "2024-12-08T23:00:00.000+00:00",
          "number": "53",
          "summary": "Neue Updates von Gentoo aufgenommen"
        },
        {
          "date": "2024-12-12T23:00:00.000+00:00",
          "number": "54",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2024-12-19T23:00:00.000+00:00",
          "number": "55",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        },
        {
          "date": "2025-01-06T23:00:00.000+00:00",
          "number": "56",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2025-01-08T23:00:00.000+00:00",
          "number": "57",
          "summary": "Neue Updates von Juniper aufgenommen"
        },
        {
          "date": "2025-01-12T23:00:00.000+00:00",
          "number": "58",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2025-01-15T23:00:00.000+00:00",
          "number": "59",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2025-01-28T23:00:00.000+00:00",
          "number": "60",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        },
        {
          "date": "2025-02-26T23:00:00.000+00:00",
          "number": "61",
          "summary": "Neue Updates von IBM aufgenommen"
        },
        {
          "date": "2025-03-26T23:00:00.000+00:00",
          "number": "62",
          "summary": "Neue Updates von Amazon aufgenommen"
        },
        {
          "date": "2025-04-10T22:00:00.000+00:00",
          "number": "63",
          "summary": "Neue Updates aufgenommen"
        },
        {
          "date": "2025-06-04T22:00:00.000+00:00",
          "number": "64",
          "summary": "Neue Updates von SUSE aufgenommen"
        }
      ],
      "status": "final",
      "version": "64"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Amazon Linux 2",
            "product": {
              "name": "Amazon Linux 2",
              "product_id": "398363",
              "product_identification_helper": {
                "cpe": "cpe:/o:amazon:linux_2:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Amazon"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Debian Linux",
            "product": {
              "name": "Debian Linux",
              "product_id": "2951",
              "product_identification_helper": {
                "cpe": "cpe:/o:debian:debian_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Debian"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c3.8.1.2",
                "product": {
                  "name": "Dell ECS \u003c3.8.1.2",
                  "product_id": "T037906"
                }
              },
              {
                "category": "product_version",
                "name": "3.8.1.2",
                "product": {
                  "name": "Dell ECS 3.8.1.2",
                  "product_id": "T037906-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/h:dell:ecs:3.8.1.2"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "ECS"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Dell NetWorker",
                "product": {
                  "name": "Dell NetWorker",
                  "product_id": "T024663",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:dell:networker:-"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003c19.11",
                "product": {
                  "name": "Dell NetWorker \u003c19.11",
                  "product_id": "T035785"
                }
              },
              {
                "category": "product_version",
                "name": "19.11",
                "product": {
                  "name": "Dell NetWorker 19.11",
                  "product_id": "T035785-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:dell:networker:19.11"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "NetWorker"
          }
        ],
        "category": "vendor",
        "name": "Dell"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "EMC Avamar",
            "product": {
              "name": "EMC Avamar",
              "product_id": "T014381",
              "product_identification_helper": {
                "cpe": "cpe:/a:emc:avamar:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "EMC"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "F5 BIG-IP",
            "product": {
              "name": "F5 BIG-IP",
              "product_id": "T001663",
              "product_identification_helper": {
                "cpe": "cpe:/a:f5:big-ip:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "F5"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Fedora Linux",
            "product": {
              "name": "Fedora Linux",
              "product_id": "74185",
              "product_identification_helper": {
                "cpe": "cpe:/o:fedoraproject:fedora:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Fedora"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "FreeBSD Project FreeBSD OS",
            "product": {
              "name": "FreeBSD Project FreeBSD OS",
              "product_id": "4035",
              "product_identification_helper": {
                "cpe": "cpe:/o:freebsd:freebsd:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "FreeBSD Project"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Gentoo Linux",
            "product": {
              "name": "Gentoo Linux",
              "product_id": "T012167",
              "product_identification_helper": {
                "cpe": "cpe:/o:gentoo:linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Gentoo"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "7.3",
                "product": {
                  "name": "IBM AIX 7.3",
                  "product_id": "1139691",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:ibm:aix:7.3"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "7.2",
                "product": {
                  "name": "IBM AIX 7.2",
                  "product_id": "T035154",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:ibm:aix:7.2"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "AIX"
          },
          {
            "category": "product_name",
            "name": "IBM FlashSystem",
            "product": {
              "name": "IBM FlashSystem",
              "product_id": "T025159",
              "product_identification_helper": {
                "cpe": "cpe:/a:ibm:flashsystem:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "IBM SAN Volume Controller",
            "product": {
              "name": "IBM SAN Volume Controller",
              "product_id": "T002782",
              "product_identification_helper": {
                "cpe": "cpe:/a:ibm:san_volume_controller:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "IBM Storwize",
            "product": {
              "name": "IBM Storwize",
              "product_id": "T021621",
              "product_identification_helper": {
                "cpe": "cpe:/a:ibm:storwize:-"
              }
            }
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "3.1",
                "product": {
                  "name": "IBM VIOS 3.1",
                  "product_id": "1039165",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:ibm:vios:3.1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "4.1",
                "product": {
                  "name": "IBM VIOS 4.1",
                  "product_id": "1522854",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:ibm:vios:4.1"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "VIOS"
          }
        ],
        "category": "vendor",
        "name": "IBM"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "8.6.2.4",
                "product": {
                  "name": "Infoblox NIOS 8.6.2.4",
                  "product_id": "T032850",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:infoblox:nios:8.6.2.4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "8.6.3.2",
                "product": {
                  "name": "Infoblox NIOS 8.6.3.2",
                  "product_id": "T032851",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:infoblox:nios:8.6.3.2"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "8.6.4",
                "product": {
                  "name": "Infoblox NIOS 8.6.4",
                  "product_id": "T032852",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:infoblox:nios:8.6.4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "9.0.2",
                "product": {
                  "name": "Infoblox NIOS 9.0.2",
                  "product_id": "T032853",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:infoblox:nios:9.0.2"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "9.0.3",
                "product": {
                  "name": "Infoblox NIOS 9.0.3",
                  "product_id": "T032854",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:infoblox:nios:9.0.3"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "NIOS"
          }
        ],
        "category": "vendor",
        "name": "Infoblox"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c9.16.48",
                "product": {
                  "name": "Internet Systems Consortium BIND \u003c9.16.48",
                  "product_id": "T032734"
                }
              },
              {
                "category": "product_version",
                "name": "9.16.48",
                "product": {
                  "name": "Internet Systems Consortium BIND 9.16.48",
                  "product_id": "T032734-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:isc:bind:9.16.48"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003c9.18.24",
                "product": {
                  "name": "Internet Systems Consortium BIND \u003c9.18.24",
                  "product_id": "T032735"
                }
              },
              {
                "category": "product_version",
                "name": "9.18.24",
                "product": {
                  "name": "Internet Systems Consortium BIND 9.18.24",
                  "product_id": "T032735-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:isc:bind:9.18.24"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003c9.19.21",
                "product": {
                  "name": "Internet Systems Consortium BIND \u003c9.19.21",
                  "product_id": "T032736"
                }
              },
              {
                "category": "product_version",
                "name": "9.19.21",
                "product": {
                  "name": "Internet Systems Consortium BIND 9.19.21",
                  "product_id": "T032736-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:isc:bind:9.19.21"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "Supported Preview Edition \u003c9.16.48-S1",
                "product": {
                  "name": "Internet Systems Consortium BIND Supported Preview Edition \u003c9.16.48-S1",
                  "product_id": "T032737"
                }
              },
              {
                "category": "product_version",
                "name": "Supported Preview Edition 9.16.48-S1",
                "product": {
                  "name": "Internet Systems Consortium BIND Supported Preview Edition 9.16.48-S1",
                  "product_id": "T032737-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:isc:bind:supported_preview_edition__9.16.48-s1"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "Supported Preview Edition \u003c9.18.24-S1",
                "product": {
                  "name": "Internet Systems Consortium BIND Supported Preview Edition \u003c9.18.24-S1",
                  "product_id": "T032738"
                }
              },
              {
                "category": "product_version",
                "name": "Supported Preview Edition 9.18.24-S1",
                "product": {
                  "name": "Internet Systems Consortium BIND Supported Preview Edition 9.18.24-S1",
                  "product_id": "T032738-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:isc:bind:supported_preview_edition__9.18.24-s1"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "BIND"
          }
        ],
        "category": "vendor",
        "name": "Internet Systems Consortium"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c24.1R2",
                "product": {
                  "name": "Juniper Junos Space \u003c24.1R2",
                  "product_id": "T040074"
                }
              },
              {
                "category": "product_version",
                "name": "24.1R2",
                "product": {
                  "name": "Juniper Junos Space 24.1R2",
                  "product_id": "T040074-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:juniper:junos_space:24.1r2"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "Junos Space"
          }
        ],
        "category": "vendor",
        "name": "Juniper"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c4.8.6",
                "product": {
                  "name": "Open Source PowerDNS \u003c4.8.6",
                  "product_id": "T032836"
                }
              },
              {
                "category": "product_version",
                "name": "4.8.6",
                "product": {
                  "name": "Open Source PowerDNS 4.8.6",
                  "product_id": "T032836-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:powerdns:authoritative:4.8.6"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003c4.9.3",
                "product": {
                  "name": "Open Source PowerDNS \u003c4.9.3",
                  "product_id": "T032837"
                }
              },
              {
                "category": "product_version",
                "name": "4.9.3",
                "product": {
                  "name": "Open Source PowerDNS 4.9.3",
                  "product_id": "T032837-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:powerdns:authoritative:4.9.3"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003c5.0.2",
                "product": {
                  "name": "Open Source PowerDNS \u003c5.0.2",
                  "product_id": "T032838"
                }
              },
              {
                "category": "product_version",
                "name": "5.0.2",
                "product": {
                  "name": "Open Source PowerDNS 5.0.2",
                  "product_id": "T032838-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:powerdns:authoritative:5.0.2"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "PowerDNS"
          },
          {
            "category": "product_name",
            "name": "Open Source dnsmasq",
            "product": {
              "name": "Open Source dnsmasq",
              "product_id": "T033495",
              "product_identification_helper": {
                "cpe": "cpe:/a:dnsmasq:dnsmasq:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Open Source"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Oracle Linux",
            "product": {
              "name": "Oracle Linux",
              "product_id": "T004914",
              "product_identification_helper": {
                "cpe": "cpe:/o:oracle:linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Oracle"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "RESF Rocky Linux",
            "product": {
              "name": "RESF Rocky Linux",
              "product_id": "T032255",
              "product_identification_helper": {
                "cpe": "cpe:/o:resf:rocky_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "RESF"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Red Hat Enterprise Linux",
            "product": {
              "name": "Red Hat Enterprise Linux",
              "product_id": "67646",
              "product_identification_helper": {
                "cpe": "cpe:/o:redhat:enterprise_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "SUSE Linux",
            "product": {
              "name": "SUSE Linux",
              "product_id": "T002207",
              "product_identification_helper": {
                "cpe": "cpe:/o:suse:suse_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Ubuntu Linux",
                "product": {
                  "name": "Ubuntu Linux",
                  "product_id": "T000126",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:canonical:ubuntu_linux:-"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003c22.04",
                "product": {
                  "name": "Ubuntu Linux \u003c22.04",
                  "product_id": "T032739"
                }
              },
              {
                "category": "product_version",
                "name": "22.04",
                "product": {
                  "name": "Ubuntu Linux 22.04",
                  "product_id": "T032739-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:canonical:ubuntu_linux:22.04"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003c23.10",
                "product": {
                  "name": "Ubuntu Linux \u003c23.10",
                  "product_id": "T032740"
                }
              },
              {
                "category": "product_version",
                "name": "23.1",
                "product": {
                  "name": "Ubuntu Linux 23.10",
                  "product_id": "T032740-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:canonical:ubuntu_linux:23.10"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "Linux"
          }
        ],
        "category": "vendor",
        "name": "Ubuntu"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "v9",
                "product": {
                  "name": "Xerox FreeFlow Print Server v9",
                  "product_id": "T015632",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:xerox:freeflow_print_server:v9"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "FreeFlow Print Server"
          }
        ],
        "category": "vendor",
        "name": "Xerox"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2023-4408",
      "product_status": {
        "known_affected": [
          "T032740",
          "67646",
          "4035",
          "T035154",
          "T004914",
          "T033495",
          "1139691",
          "T040074",
          "T024663",
          "T032838",
          "T032739",
          "T001663",
          "398363",
          "T032836",
          "T032737",
          "T025159",
          "T032837",
          "T032738",
          "T032852",
          "T032853",
          "T032850",
          "T002782",
          "T032851",
          "T037906",
          "T032735",
          "T032736",
          "T032854",
          "T032734",
          "1039165",
          "1522854",
          "T015632",
          "T012167",
          "T032255",
          "T035785",
          "74185",
          "T021621",
          "T014381",
          "2951",
          "T002207",
          "T000126"
        ]
      },
      "release_date": "2024-02-13T23:00:00.000+00:00",
      "title": "CVE-2023-4408"
    },
    {
      "cve": "CVE-2023-50387",
      "product_status": {
        "known_affected": [
          "T032740",
          "67646",
          "4035",
          "T035154",
          "T004914",
          "T033495",
          "1139691",
          "T040074",
          "T024663",
          "T032838",
          "T032739",
          "T001663",
          "398363",
          "T032836",
          "T032737",
          "T025159",
          "T032837",
          "T032738",
          "T032852",
          "T032853",
          "T032850",
          "T002782",
          "T032851",
          "T037906",
          "T032735",
          "T032736",
          "T032854",
          "T032734",
          "1039165",
          "1522854",
          "T015632",
          "T012167",
          "T032255",
          "T035785",
          "74185",
          "T021621",
          "T014381",
          "2951",
          "T002207",
          "T000126"
        ]
      },
      "release_date": "2024-02-13T23:00:00.000+00:00",
      "title": "CVE-2023-50387"
    },
    {
      "cve": "CVE-2023-50868",
      "product_status": {
        "known_affected": [
          "T032740",
          "67646",
          "4035",
          "T035154",
          "T004914",
          "T033495",
          "1139691",
          "T040074",
          "T024663",
          "T032838",
          "T032739",
          "T001663",
          "398363",
          "T032836",
          "T032737",
          "T025159",
          "T032837",
          "T032738",
          "T032852",
          "T032853",
          "T032850",
          "T002782",
          "T032851",
          "T037906",
          "T032735",
          "T032736",
          "T032854",
          "T032734",
          "1039165",
          "1522854",
          "T015632",
          "T012167",
          "T032255",
          "T035785",
          "74185",
          "T021621",
          "T014381",
          "2951",
          "T002207",
          "T000126"
        ]
      },
      "release_date": "2024-02-13T23:00:00.000+00:00",
      "title": "CVE-2023-50868"
    },
    {
      "cve": "CVE-2023-5517",
      "product_status": {
        "known_affected": [
          "T032740",
          "67646",
          "4035",
          "T035154",
          "T004914",
          "T033495",
          "1139691",
          "T040074",
          "T024663",
          "T032838",
          "T032739",
          "T001663",
          "398363",
          "T032836",
          "T032737",
          "T025159",
          "T032837",
          "T032738",
          "T032852",
          "T032853",
          "T032850",
          "T002782",
          "T032851",
          "T037906",
          "T032735",
          "T032736",
          "T032854",
          "T032734",
          "1039165",
          "1522854",
          "T015632",
          "T012167",
          "T032255",
          "T035785",
          "74185",
          "T021621",
          "T014381",
          "2951",
          "T002207",
          "T000126"
        ]
      },
      "release_date": "2024-02-13T23:00:00.000+00:00",
      "title": "CVE-2023-5517"
    },
    {
      "cve": "CVE-2023-5679",
      "product_status": {
        "known_affected": [
          "T032740",
          "67646",
          "4035",
          "T035154",
          "T004914",
          "T033495",
          "1139691",
          "T040074",
          "T024663",
          "T032838",
          "T032739",
          "T001663",
          "398363",
          "T032836",
          "T032737",
          "T025159",
          "T032837",
          "T032738",
          "T032852",
          "T032853",
          "T032850",
          "T002782",
          "T032851",
          "T037906",
          "T032735",
          "T032736",
          "T032854",
          "T032734",
          "1039165",
          "1522854",
          "T015632",
          "T012167",
          "T032255",
          "T035785",
          "74185",
          "T021621",
          "T014381",
          "2951",
          "T002207",
          "T000126"
        ]
      },
      "release_date": "2024-02-13T23:00:00.000+00:00",
      "title": "CVE-2023-5679"
    },
    {
      "cve": "CVE-2023-5680",
      "product_status": {
        "known_affected": [
          "T032740",
          "67646",
          "4035",
          "T035154",
          "T004914",
          "T033495",
          "1139691",
          "T040074",
          "T024663",
          "T032838",
          "T032739",
          "T001663",
          "398363",
          "T032836",
          "T032737",
          "T025159",
          "T032837",
          "T032738",
          "T032852",
          "T032853",
          "T032850",
          "T002782",
          "T032851",
          "T037906",
          "T032735",
          "T032736",
          "T032854",
          "T032734",
          "1039165",
          "1522854",
          "T015632",
          "T012167",
          "T032255",
          "T035785",
          "74185",
          "T021621",
          "T014381",
          "2951",
          "T002207",
          "T000126"
        ]
      },
      "release_date": "2024-02-13T23:00:00.000+00:00",
      "title": "CVE-2023-5680"
    },
    {
      "cve": "CVE-2023-6516",
      "product_status": {
        "known_affected": [
          "T032740",
          "67646",
          "4035",
          "T035154",
          "T004914",
          "T033495",
          "1139691",
          "T040074",
          "T024663",
          "T032838",
          "T032739",
          "T001663",
          "398363",
          "T032836",
          "T032737",
          "T025159",
          "T032837",
          "T032738",
          "T032852",
          "T032853",
          "T032850",
          "T002782",
          "T032851",
          "T037906",
          "T032735",
          "T032736",
          "T032854",
          "T032734",
          "1039165",
          "1522854",
          "T015632",
          "T012167",
          "T032255",
          "T035785",
          "74185",
          "T021621",
          "T014381",
          "2951",
          "T002207",
          "T000126"
        ]
      },
      "release_date": "2024-02-13T23:00:00.000+00:00",
      "title": "CVE-2023-6516"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…