Numerous vulnerabilities have been reported in various Domain Name System (DNS) implementations. The impacts of these vulnerabilities may allow an attacker to execute arbitrary code, cause a denial-of-service condition, or cause a DNS implementation to behave in an unstable/unpredictable manner.
The Domain Name System provides name, address, and other information about Internet Protocol (IP) networks and devices.
These vulnerabilities may allow a remote attacker to execute arbitrary code, cause a denial-of-service condition, gain access to sensitive information, or cause an DNS implementation to behave in an unstable/unpredictable manner.
Apply a patch from an affected product vendor
F5 Networks, Inc.
Juniper Networks, Inc.
Apple Computer, Inc.
EMC, Inc. (formerly Data General Corporation)
Engarde Secure Linux
IBM Corporation (zseries)
Immunix Communications, Inc.
Ingrian Networks, Inc.
Internet Software Consortium
MontaVista Software, Inc.
QNX, Software Systems, Inc.
Red Hat, Inc.
Silicon Graphics, Inc.
Slackware Linux Inc.
Sun Microsystems, Inc.
Trustix Secure Linux
Wind River Systems, Inc.
These vulnerabilities were reported by NISCC and Oulu University Secure Programming Group (OUSPG)
This document was written by Jeff Gennari.
|Date First Published:||2006-04-28|
|Date Last Updated:||2006-05-23 12:43 UTC|