freebsd-ports/dns/bind94
Doug Barton 400315c158 Include a patch from ISC to deal with the following vulnerability:
Name:			BIND: Self Check Failing [Added 2005.25.01]
Versions affected:	BIND 9.3.0
Severity:		LOW
Exploitable:		Remotely
Type:			Denial of Service
Description:
An incorrect assumption in the validator (authvalidated) can result in a
REQUIRE (internal consistancy) test failing and named exiting.

Workarounds:
Turn off dnssec validation (off by default) at the options/view level.

	dnssec-enable no;

Active Exploits:	None known

Bump PORTREVISION accordingly.

It should be noted that the vast majority of users would not have
DNSSEC enabled, and therefore are not vulnerable to this bug.
2005-01-28 20:47:44 +00:00
..
files Update to BIND 9.3.0, the latest from ISC. This version has several 2004-09-24 04:03:31 +00:00
distinfo Include a patch from ISC to deal with the following vulnerability: 2005-01-28 20:47:44 +00:00
Makefile Include a patch from ISC to deal with the following vulnerability: 2005-01-28 20:47:44 +00:00
pkg-descr Update to BIND 9.3.0, the latest from ISC. This version has several 2004-09-24 04:03:31 +00:00
pkg-message Update to BIND 9.3.0, the latest from ISC. This version has several 2004-09-24 04:03:31 +00:00
pkg-plist Update to BIND 9.3.0, the latest from ISC. This version has several 2004-09-24 04:03:31 +00:00