[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Full-disclosure] Advisory 2006-03-11 Integer Overflow in



ISC BIND
Message-ID: <edeab387adea846d2f407a63979614d9@xxxxxxxxxxxxxxxx>
X-Priority: 3
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
Content-Type: text/plain; charset="iso-8859-1"

Advisory 2006-03-11 Integer Overflow in 
ISC BIND

I. BACKGROUND

Advisory marked for immediate release.

II. DESCRIPTION


ISC BIND incorrectly parses integer data

III. HISTORY

This advisory has no history.

IV. WORKAROUND

There are no known workarounds.

V. VENDOR RESPONSE


ISC BIND has not commented on this issue.

VI. CVE INFORMATION

The Common Vulnerabilities and Exposures (CVE) project has assigned the
name CVE-2006-205043 to this issue.

APPENDIX A. - Vendor Information
http://www.isc.org/index.pl?/sw/bind/

APPENDIX B. - References
NONE

CONTACT:
*Geo.
 bantown@xxxxxxx
*1-888-LOL-WHAT
*CISSP GSAE CCE CEH CSFA GREM SSP-CNSA SSP-MPA GIPS GHTQ GWAS


_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/