Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2007-0493

Summary
Assigner-redhat
Assigner Org ID-53f830b8-0a3f-465b-8143-3b8a9948e749
Published At-25 Jan, 2007 | 20:00
Updated At-07 Aug, 2024 | 12:19
Rejected At-
Credits

Use-after-free vulnerability in ISC BIND 9.3.0 up to 9.3.3, 9.4.0a1 up to 9.4.0a6, 9.4.0b1 up to 9.4.0b4, 9.4.0rc1, and 9.5.0a1 (Bind Forum only) allows remote attackers to cause a denial of service (named daemon crash) via unspecified vectors that cause named to "dereference a freed fetch context."

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:redhat
Assigner Org ID:53f830b8-0a3f-465b-8143-3b8a9948e749
Published At:25 Jan, 2007 | 20:00
Updated At:07 Aug, 2024 | 12:19
Rejected At:
▼CVE Numbering Authority (CNA)

Use-after-free vulnerability in ISC BIND 9.3.0 up to 9.3.3, 9.4.0a1 up to 9.4.0a6, 9.4.0b1 up to 9.4.0b4, 9.4.0rc1, and 9.5.0a1 (Bind Forum only) allows remote attackers to cause a denial of service (named daemon crash) via unspecified vectors that cause named to "dereference a freed fetch context."

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01070495
vendor-advisory
x_refsource_HP
http://docs.info.apple.com/article.html?artnum=305530
x_refsource_CONFIRM
http://security.gentoo.org/glsa/glsa-200702-06.xml
vendor-advisory
x_refsource_GENTOO
http://secunia.com/advisories/24129
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/24048
third-party-advisory
x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2007/1939
vdb-entry
x_refsource_VUPEN
http://security.freebsd.org/advisories/FreeBSD-SA-07:02.bind.asc
vendor-advisory
x_refsource_FREEBSD
https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144
vendor-advisory
x_refsource_HP
http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.007.html
vendor-advisory
x_refsource_OPENPKG
http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2007-003.txt.asc
vendor-advisory
x_refsource_NETBSD
http://secunia.com/advisories/23943
third-party-advisory
x_refsource_SECUNIA
http://www.mandriva.com/security/advisories?name=MDKSA-2007:030
vendor-advisory
x_refsource_MANDRIVA
http://www.redhat.com/support/errata/RHSA-2007-0057.html
vendor-advisory
x_refsource_REDHAT
http://www.trustix.org/errata/2007/0005
vendor-advisory
x_refsource_TRUSTIX
http://lists.apple.com/archives/security-announce/2007/May/msg00004.html
vendor-advisory
x_refsource_APPLE
http://secunia.com/advisories/25402
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/25649
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/24930
third-party-advisory
x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2007/2163
vdb-entry
x_refsource_VUPEN
https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144
vendor-advisory
x_refsource_HP
http://fedoranews.org/cms/node/2537
vendor-advisory
x_refsource_FEDORA
http://secunia.com/advisories/23977
third-party-advisory
x_refsource_SECUNIA
http://www.isc.org/index.pl?/sw/bind/view/?release=9.2.8
x_refsource_CONFIRM
https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144
vendor-advisory
x_refsource_HP
http://www.isc.org/index.pl?/sw/bind/bind-security.php
x_refsource_CONFIRM
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01070495
vendor-advisory
x_refsource_HP
http://www.ubuntu.com/usn/usn-418-1
vendor-advisory
x_refsource_UBUNTU
http://secunia.com/advisories/24203
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/24014
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/24054
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/23974
third-party-advisory
x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2007/2315
vdb-entry
x_refsource_VUPEN
http://www.securityfocus.com/archive/1/458066/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
http://lists.suse.com/archive/suse-security-announce/2007-Jan/0016.html
vendor-advisory
x_refsource_SUSE
https://issues.rpath.com/browse/RPL-989
x_refsource_CONFIRM
http://www.isc.org/index.pl?/sw/bind/view/?release=9.3.4
x_refsource_CONFIRM
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04952488
x_refsource_CONFIRM
http://marc.info/?l=bind-announce&m=116968519321296&w=2
mailing-list
x_refsource_MLIST
http://www.vupen.com/english/advisories/2007/1401
vdb-entry
x_refsource_VUPEN
http://fedoranews.org/cms/node/2507
vendor-advisory
x_refsource_FEDORA
http://secunia.com/advisories/23904
third-party-advisory
x_refsource_SECUNIA
https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144
vendor-advisory
x_refsource_HP
http://www.securityfocus.com/bid/22229
vdb-entry
x_refsource_BID
http://www.vupen.com/english/advisories/2007/0349
vdb-entry
x_refsource_VUPEN
http://lists.grok.org.uk/pipermail/full-disclosure/2007-January/052018.html
mailing-list
x_refsource_FULLDISC
http://securitytracker.com/id?1017561
vdb-entry
x_refsource_SECTRACK
http://secunia.com/advisories/23924
third-party-advisory
x_refsource_SECUNIA
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9614
vdb-entry
signature
x_refsource_OVAL
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.494157
vendor-advisory
x_refsource_SLACKWARE
http://secunia.com/advisories/24950
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/23972
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01070495
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://docs.info.apple.com/article.html?artnum=305530
Resource:
x_refsource_CONFIRM
Hyperlink: http://security.gentoo.org/glsa/glsa-200702-06.xml
Resource:
vendor-advisory
x_refsource_GENTOO
Hyperlink: http://secunia.com/advisories/24129
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/24048
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vupen.com/english/advisories/2007/1939
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://security.freebsd.org/advisories/FreeBSD-SA-07:02.bind.asc
Resource:
vendor-advisory
x_refsource_FREEBSD
Hyperlink: https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.007.html
Resource:
vendor-advisory
x_refsource_OPENPKG
Hyperlink: http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2007-003.txt.asc
Resource:
vendor-advisory
x_refsource_NETBSD
Hyperlink: http://secunia.com/advisories/23943
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.mandriva.com/security/advisories?name=MDKSA-2007:030
Resource:
vendor-advisory
x_refsource_MANDRIVA
Hyperlink: http://www.redhat.com/support/errata/RHSA-2007-0057.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://www.trustix.org/errata/2007/0005
Resource:
vendor-advisory
x_refsource_TRUSTIX
Hyperlink: http://lists.apple.com/archives/security-announce/2007/May/msg00004.html
Resource:
vendor-advisory
x_refsource_APPLE
Hyperlink: http://secunia.com/advisories/25402
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/25649
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/24930
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vupen.com/english/advisories/2007/2163
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://fedoranews.org/cms/node/2537
Resource:
vendor-advisory
x_refsource_FEDORA
Hyperlink: http://secunia.com/advisories/23977
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.isc.org/index.pl?/sw/bind/view/?release=9.2.8
Resource:
x_refsource_CONFIRM
Hyperlink: https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://www.isc.org/index.pl?/sw/bind/bind-security.php
Resource:
x_refsource_CONFIRM
Hyperlink: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01070495
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://www.ubuntu.com/usn/usn-418-1
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: http://secunia.com/advisories/24203
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/24014
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/24054
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/23974
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vupen.com/english/advisories/2007/2315
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://www.securityfocus.com/archive/1/458066/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
Hyperlink: http://lists.suse.com/archive/suse-security-announce/2007-Jan/0016.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: https://issues.rpath.com/browse/RPL-989
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.isc.org/index.pl?/sw/bind/view/?release=9.3.4
Resource:
x_refsource_CONFIRM
Hyperlink: https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04952488
Resource:
x_refsource_CONFIRM
Hyperlink: http://marc.info/?l=bind-announce&m=116968519321296&w=2
Resource:
mailing-list
x_refsource_MLIST
Hyperlink: http://www.vupen.com/english/advisories/2007/1401
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://fedoranews.org/cms/node/2507
Resource:
vendor-advisory
x_refsource_FEDORA
Hyperlink: http://secunia.com/advisories/23904
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://www.securityfocus.com/bid/22229
Resource:
vdb-entry
x_refsource_BID
Hyperlink: http://www.vupen.com/english/advisories/2007/0349
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://lists.grok.org.uk/pipermail/full-disclosure/2007-January/052018.html
Resource:
mailing-list
x_refsource_FULLDISC
Hyperlink: http://securitytracker.com/id?1017561
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://secunia.com/advisories/23924
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9614
Resource:
vdb-entry
signature
x_refsource_OVAL
Hyperlink: http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.494157
Resource:
vendor-advisory
x_refsource_SLACKWARE
Hyperlink: http://secunia.com/advisories/24950
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/23972
Resource:
third-party-advisory
x_refsource_SECUNIA
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01070495
vendor-advisory
x_refsource_HP
x_transferred
http://docs.info.apple.com/article.html?artnum=305530
x_refsource_CONFIRM
x_transferred
http://security.gentoo.org/glsa/glsa-200702-06.xml
vendor-advisory
x_refsource_GENTOO
x_transferred
http://secunia.com/advisories/24129
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/24048
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vupen.com/english/advisories/2007/1939
vdb-entry
x_refsource_VUPEN
x_transferred
http://security.freebsd.org/advisories/FreeBSD-SA-07:02.bind.asc
vendor-advisory
x_refsource_FREEBSD
x_transferred
https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144
vendor-advisory
x_refsource_HP
x_transferred
http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.007.html
vendor-advisory
x_refsource_OPENPKG
x_transferred
http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2007-003.txt.asc
vendor-advisory
x_refsource_NETBSD
x_transferred
http://secunia.com/advisories/23943
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.mandriva.com/security/advisories?name=MDKSA-2007:030
vendor-advisory
x_refsource_MANDRIVA
x_transferred
http://www.redhat.com/support/errata/RHSA-2007-0057.html
vendor-advisory
x_refsource_REDHAT
x_transferred
http://www.trustix.org/errata/2007/0005
vendor-advisory
x_refsource_TRUSTIX
x_transferred
http://lists.apple.com/archives/security-announce/2007/May/msg00004.html
vendor-advisory
x_refsource_APPLE
x_transferred
http://secunia.com/advisories/25402
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/25649
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/24930
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vupen.com/english/advisories/2007/2163
vdb-entry
x_refsource_VUPEN
x_transferred
https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144
vendor-advisory
x_refsource_HP
x_transferred
http://fedoranews.org/cms/node/2537
vendor-advisory
x_refsource_FEDORA
x_transferred
http://secunia.com/advisories/23977
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.isc.org/index.pl?/sw/bind/view/?release=9.2.8
x_refsource_CONFIRM
x_transferred
https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144
vendor-advisory
x_refsource_HP
x_transferred
http://www.isc.org/index.pl?/sw/bind/bind-security.php
x_refsource_CONFIRM
x_transferred
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01070495
vendor-advisory
x_refsource_HP
x_transferred
http://www.ubuntu.com/usn/usn-418-1
vendor-advisory
x_refsource_UBUNTU
x_transferred
http://secunia.com/advisories/24203
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/24014
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/24054
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/23974
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vupen.com/english/advisories/2007/2315
vdb-entry
x_refsource_VUPEN
x_transferred
http://www.securityfocus.com/archive/1/458066/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
x_transferred
http://lists.suse.com/archive/suse-security-announce/2007-Jan/0016.html
vendor-advisory
x_refsource_SUSE
x_transferred
https://issues.rpath.com/browse/RPL-989
x_refsource_CONFIRM
x_transferred
http://www.isc.org/index.pl?/sw/bind/view/?release=9.3.4
x_refsource_CONFIRM
x_transferred
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04952488
x_refsource_CONFIRM
x_transferred
http://marc.info/?l=bind-announce&m=116968519321296&w=2
mailing-list
x_refsource_MLIST
x_transferred
http://www.vupen.com/english/advisories/2007/1401
vdb-entry
x_refsource_VUPEN
x_transferred
http://fedoranews.org/cms/node/2507
vendor-advisory
x_refsource_FEDORA
x_transferred
http://secunia.com/advisories/23904
third-party-advisory
x_refsource_SECUNIA
x_transferred
https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144
vendor-advisory
x_refsource_HP
x_transferred
http://www.securityfocus.com/bid/22229
vdb-entry
x_refsource_BID
x_transferred
http://www.vupen.com/english/advisories/2007/0349
vdb-entry
x_refsource_VUPEN
x_transferred
http://lists.grok.org.uk/pipermail/full-disclosure/2007-January/052018.html
mailing-list
x_refsource_FULLDISC
x_transferred
http://securitytracker.com/id?1017561
vdb-entry
x_refsource_SECTRACK
x_transferred
http://secunia.com/advisories/23924
third-party-advisory
x_refsource_SECUNIA
x_transferred
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9614
vdb-entry
signature
x_refsource_OVAL
x_transferred
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.494157
vendor-advisory
x_refsource_SLACKWARE
x_transferred
http://secunia.com/advisories/24950
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/23972
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01070495
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://docs.info.apple.com/article.html?artnum=305530
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://security.gentoo.org/glsa/glsa-200702-06.xml
Resource:
vendor-advisory
x_refsource_GENTOO
x_transferred
Hyperlink: http://secunia.com/advisories/24129
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/24048
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2007/1939
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://security.freebsd.org/advisories/FreeBSD-SA-07:02.bind.asc
Resource:
vendor-advisory
x_refsource_FREEBSD
x_transferred
Hyperlink: https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.007.html
Resource:
vendor-advisory
x_refsource_OPENPKG
x_transferred
Hyperlink: http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2007-003.txt.asc
Resource:
vendor-advisory
x_refsource_NETBSD
x_transferred
Hyperlink: http://secunia.com/advisories/23943
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.mandriva.com/security/advisories?name=MDKSA-2007:030
Resource:
vendor-advisory
x_refsource_MANDRIVA
x_transferred
Hyperlink: http://www.redhat.com/support/errata/RHSA-2007-0057.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://www.trustix.org/errata/2007/0005
Resource:
vendor-advisory
x_refsource_TRUSTIX
x_transferred
Hyperlink: http://lists.apple.com/archives/security-announce/2007/May/msg00004.html
Resource:
vendor-advisory
x_refsource_APPLE
x_transferred
Hyperlink: http://secunia.com/advisories/25402
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/25649
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/24930
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2007/2163
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://fedoranews.org/cms/node/2537
Resource:
vendor-advisory
x_refsource_FEDORA
x_transferred
Hyperlink: http://secunia.com/advisories/23977
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.isc.org/index.pl?/sw/bind/view/?release=9.2.8
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://www.isc.org/index.pl?/sw/bind/bind-security.php
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01070495
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://www.ubuntu.com/usn/usn-418-1
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: http://secunia.com/advisories/24203
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/24014
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/24054
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/23974
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2007/2315
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://www.securityfocus.com/archive/1/458066/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
x_transferred
Hyperlink: http://lists.suse.com/archive/suse-security-announce/2007-Jan/0016.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: https://issues.rpath.com/browse/RPL-989
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.isc.org/index.pl?/sw/bind/view/?release=9.3.4
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04952488
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://marc.info/?l=bind-announce&m=116968519321296&w=2
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2007/1401
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://fedoranews.org/cms/node/2507
Resource:
vendor-advisory
x_refsource_FEDORA
x_transferred
Hyperlink: http://secunia.com/advisories/23904
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://www.securityfocus.com/bid/22229
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2007/0349
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://lists.grok.org.uk/pipermail/full-disclosure/2007-January/052018.html
Resource:
mailing-list
x_refsource_FULLDISC
x_transferred
Hyperlink: http://securitytracker.com/id?1017561
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://secunia.com/advisories/23924
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9614
Resource:
vdb-entry
signature
x_refsource_OVAL
x_transferred
Hyperlink: http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.494157
Resource:
vendor-advisory
x_refsource_SLACKWARE
x_transferred
Hyperlink: http://secunia.com/advisories/24950
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/23972
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:secalert@redhat.com
Published At:25 Jan, 2007 | 20:28
Updated At:13 Feb, 2023 | 02:17

Use-after-free vulnerability in ISC BIND 9.3.0 up to 9.3.3, 9.4.0a1 up to 9.4.0a6, 9.4.0b1 up to 9.4.0b4, 9.4.0rc1, and 9.5.0a1 (Bind Forum only) allows remote attackers to cause a denial of service (named daemon crash) via unspecified vectors that cause named to "dereference a freed fetch context."

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.07.8HIGH
AV:N/AC:L/Au:N/C:N/I:N/A:C
Type: Primary
Version: 2.0
Base score: 7.8
Base severity: HIGH
Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:C
CPE Matches

Internet Systems Consortium, Inc.
isc
>>bind>>9.3.0
cpe:2.3:a:isc:bind:9.3.0:*:*:*:*:*:*:*
Internet Systems Consortium, Inc.
isc
>>bind>>9.3.1
cpe:2.3:a:isc:bind:9.3.1:*:*:*:*:*:*:*
Internet Systems Consortium, Inc.
isc
>>bind>>9.3.2
cpe:2.3:a:isc:bind:9.3.2:*:*:*:*:*:*:*
Internet Systems Consortium, Inc.
isc
>>bind>>9.4.0
cpe:2.3:a:isc:bind:9.4.0:*:*:*:*:*:*:*
Internet Systems Consortium, Inc.
isc
>>bind>>9.4.0
cpe:2.3:a:isc:bind:9.4.0:rc1:*:*:*:*:*:*
Internet Systems Consortium, Inc.
isc
>>bind>>9.5.0
cpe:2.3:a:isc:bind:9.5.0:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
NVD-CWE-OtherPrimarynvd@nist.gov
CWE ID: NVD-CWE-Other
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

Organization : Red Hat
Last Modified : 2007-01-29T00:00:00

Not vulnerable. This issue did not affect the versions of ISC BIND as shipped with Red Hat Enterprise Linux 2.1, 3, or 4.

References
HyperlinkSourceResource
http://docs.info.apple.com/article.html?artnum=305530secalert@redhat.com
N/A
http://fedoranews.org/cms/node/2507secalert@redhat.com
N/A
http://fedoranews.org/cms/node/2537secalert@redhat.com
N/A
http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2007-003.txt.ascsecalert@redhat.com
N/A
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01070495secalert@redhat.com
N/A
http://lists.apple.com/archives/security-announce/2007/May/msg00004.htmlsecalert@redhat.com
N/A
http://lists.grok.org.uk/pipermail/full-disclosure/2007-January/052018.htmlsecalert@redhat.com
N/A
http://lists.suse.com/archive/suse-security-announce/2007-Jan/0016.htmlsecalert@redhat.com
N/A
http://marc.info/?l=bind-announce&m=116968519321296&w=2secalert@redhat.com
N/A
http://secunia.com/advisories/23904secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/23924secalert@redhat.com
N/A
http://secunia.com/advisories/23943secalert@redhat.com
N/A
http://secunia.com/advisories/23972secalert@redhat.com
N/A
http://secunia.com/advisories/23974secalert@redhat.com
N/A
http://secunia.com/advisories/23977secalert@redhat.com
N/A
http://secunia.com/advisories/24014secalert@redhat.com
N/A
http://secunia.com/advisories/24048secalert@redhat.com
N/A
http://secunia.com/advisories/24054secalert@redhat.com
N/A
http://secunia.com/advisories/24129secalert@redhat.com
N/A
http://secunia.com/advisories/24203secalert@redhat.com
N/A
http://secunia.com/advisories/24930secalert@redhat.com
N/A
http://secunia.com/advisories/24950secalert@redhat.com
N/A
http://secunia.com/advisories/25402secalert@redhat.com
N/A
http://secunia.com/advisories/25649secalert@redhat.com
N/A
http://security.freebsd.org/advisories/FreeBSD-SA-07:02.bind.ascsecalert@redhat.com
N/A
http://security.gentoo.org/glsa/glsa-200702-06.xmlsecalert@redhat.com
N/A
http://securitytracker.com/id?1017561secalert@redhat.com
N/A
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.494157secalert@redhat.com
N/A
http://www.isc.org/index.pl?/sw/bind/bind-security.phpsecalert@redhat.com
N/A
http://www.isc.org/index.pl?/sw/bind/view/?release=9.2.8secalert@redhat.com
Patch
http://www.isc.org/index.pl?/sw/bind/view/?release=9.3.4secalert@redhat.com
Patch
http://www.mandriva.com/security/advisories?name=MDKSA-2007:030secalert@redhat.com
N/A
http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.007.htmlsecalert@redhat.com
N/A
http://www.redhat.com/support/errata/RHSA-2007-0057.htmlsecalert@redhat.com
N/A
http://www.securityfocus.com/archive/1/458066/100/0/threadedsecalert@redhat.com
N/A
http://www.securityfocus.com/bid/22229secalert@redhat.com
N/A
http://www.trustix.org/errata/2007/0005secalert@redhat.com
N/A
http://www.ubuntu.com/usn/usn-418-1secalert@redhat.com
N/A
http://www.vupen.com/english/advisories/2007/0349secalert@redhat.com
N/A
http://www.vupen.com/english/advisories/2007/1401secalert@redhat.com
N/A
http://www.vupen.com/english/advisories/2007/1939secalert@redhat.com
N/A
http://www.vupen.com/english/advisories/2007/2163secalert@redhat.com
N/A
http://www.vupen.com/english/advisories/2007/2315secalert@redhat.com
N/A
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04952488secalert@redhat.com
N/A
https://issues.rpath.com/browse/RPL-989secalert@redhat.com
N/A
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9614secalert@redhat.com
N/A
https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144secalert@redhat.com
N/A
Hyperlink: http://docs.info.apple.com/article.html?artnum=305530
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://fedoranews.org/cms/node/2507
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://fedoranews.org/cms/node/2537
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2007-003.txt.asc
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01070495
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://lists.apple.com/archives/security-announce/2007/May/msg00004.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://lists.grok.org.uk/pipermail/full-disclosure/2007-January/052018.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://lists.suse.com/archive/suse-security-announce/2007-Jan/0016.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://marc.info/?l=bind-announce&m=116968519321296&w=2
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/23904
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/23924
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/23943
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/23972
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/23974
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/23977
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/24014
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/24048
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/24054
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/24129
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/24203
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/24930
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/24950
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/25402
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/25649
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://security.freebsd.org/advisories/FreeBSD-SA-07:02.bind.asc
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://security.gentoo.org/glsa/glsa-200702-06.xml
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://securitytracker.com/id?1017561
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.494157
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.isc.org/index.pl?/sw/bind/bind-security.php
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.isc.org/index.pl?/sw/bind/view/?release=9.2.8
Source: secalert@redhat.com
Resource:
Patch
Hyperlink: http://www.isc.org/index.pl?/sw/bind/view/?release=9.3.4
Source: secalert@redhat.com
Resource:
Patch
Hyperlink: http://www.mandriva.com/security/advisories?name=MDKSA-2007:030
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.007.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.redhat.com/support/errata/RHSA-2007-0057.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.securityfocus.com/archive/1/458066/100/0/threaded
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.securityfocus.com/bid/22229
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.trustix.org/errata/2007/0005
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.ubuntu.com/usn/usn-418-1
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2007/0349
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2007/1401
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2007/1939
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2007/2163
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2007/2315
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04952488
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://issues.rpath.com/browse/RPL-989
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9614
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144
Source: secalert@redhat.com
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

16Records found

CVE-2013-4854
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-70.18% / 98.62%
||
7 Day CHG~0.00%
Published-26 Jul, 2013 | 23:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The RFC 5011 implementation in rdata.c in ISC BIND 9.7.x and 9.8.x before 9.8.5-P2, 9.8.6b1, 9.9.x before 9.9.3-P2, and 9.9.4b1, and DNSco BIND 9.9.3-S1 before 9.9.3-S1-P1 and 9.9.4-S1b1, allows remote attackers to cause a denial of service (assertion failure and named daemon exit) via a query with a malformed RDATA section that is not properly handled during construction of a log message, as exploited in the wild in July 2013.

Action-Not Available
Vendor-n/aNovellFreeBSD FoundationInternet Systems Consortium, Inc.Mandriva (Mandrakesoft)Fedora ProjectSlackwareHP Inc.Red Hat, Inc.SUSEopenSUSE
Product-enterprise_linuxdnsco_bindfreebsdfedoraopensusebindsuse_linuxhp-uxslackware_linuxbusiness_serversuse_linux_enterprise_software_development_kitenterprise_servern/a
CVE-2013-3919
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-9.73% / 92.62%
||
7 Day CHG~0.00%
Published-06 Jun, 2013 | 10:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

resolver.c in ISC BIND 9.8.5 before 9.8.5-P1, 9.9.3 before 9.9.3-P1, and 9.6-ESV-R9 before 9.6-ESV-R9-P1, when a recursive resolver is configured, allows remote attackers to cause a denial of service (assertion failure and named daemon exit) via a query for a record in a malformed zone.

Action-Not Available
Vendor-n/aInternet Systems Consortium, Inc.
Product-bindn/a
CVE-2013-2266
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-41.45% / 97.31%
||
7 Day CHG~0.00%
Published-28 Mar, 2013 | 16:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

libdns in ISC BIND 9.7.x and 9.8.x before 9.8.4-P2, 9.8.5 before 9.8.5b2, 9.9.x before 9.9.2-P2, and 9.9.3 before 9.9.3b2 on UNIX platforms allows remote attackers to cause a denial of service (memory consumption) via a crafted regular expression, as demonstrated by a memory-exhaustion attack against a machine running a named process.

Action-Not Available
Vendor-n/aInternet Systems Consortium, Inc.
Product-bindn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2012-5166
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-45.08% / 97.50%
||
7 Day CHG~0.00%
Published-10 Oct, 2012 | 21:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

ISC BIND 9.x before 9.7.6-P4, 9.8.x before 9.8.3-P4, 9.9.x before 9.9.1-P4, and 9.4-ESV and 9.6-ESV before 9.6-ESV-R7-P4 allows remote attackers to cause a denial of service (named daemon hang) via unspecified combinations of resource records.

Action-Not Available
Vendor-n/aInternet Systems Consortium, Inc.
Product-bindn/a
CVE-2012-3817
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-3.99% / 87.95%
||
7 Day CHG~0.00%
Published-25 Jul, 2012 | 10:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

ISC BIND 9.4.x, 9.5.x, 9.6.x, and 9.7.x before 9.7.6-P2; 9.8.x before 9.8.3-P2; 9.9.x before 9.9.1-P2; and 9.6-ESV before 9.6-ESV-R7-P2, when DNSSEC validation is enabled, does not properly initialize the failing-query cache, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) by sending many queries.

Action-Not Available
Vendor-n/aInternet Systems Consortium, Inc.
Product-bindn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2011-0413
Matching Score-8
Assigner-CERT/CC
ShareView Details
Matching Score-8
Assigner-CERT/CC
CVSS Score-7.8||HIGH
EPSS-11.21% / 93.23%
||
7 Day CHG~0.00%
Published-31 Jan, 2011 | 20:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The DHCPv6 server in ISC DHCP 4.0.x and 4.1.x before 4.1.2-P1, 4.0-ESV and 4.1-ESV before 4.1-ESV-R1, and 4.2.x before 4.2.1b1 allows remote attackers to cause a denial of service (assertion failure and daemon crash) by sending a message over IPv6 for a declined and abandoned address.

Action-Not Available
Vendor-n/aInternet Systems Consortium, Inc.
Product-dhcpn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2012-5688
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-6.26% / 90.53%
||
7 Day CHG~0.00%
Published-06 Dec, 2012 | 11:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

ISC BIND 9.8.x before 9.8.4-P1 and 9.9.x before 9.9.2-P1, when DNS64 is enabled, allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a crafted query.

Action-Not Available
Vendor-n/aCanonical Ltd.Internet Systems Consortium, Inc.
Product-bindubuntu_linuxn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2014-8500
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-43.82% / 97.44%
||
7 Day CHG~0.00%
Published-11 Dec, 2014 | 02:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

ISC BIND 9.0.x through 9.8.x, 9.9.0 through 9.9.6, and 9.10.0 through 9.10.1 does not limit delegation chaining, which allows remote attackers to cause a denial of service (memory consumption and named crash) via a large or infinite number of referrals.

Action-Not Available
Vendor-n/aInternet Systems Consortium, Inc.
Product-bindn/a
CVE-2016-2776
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-90.73% / 99.60%
||
7 Day CHG~0.00%
Published-28 Sep, 2016 | 10:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

buffer.c in named in ISC BIND 9 before 9.9.9-P3, 9.10.x before 9.10.4-P3, and 9.11.x before 9.11.0rc3 does not properly construct responses, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a crafted query.

Action-Not Available
Vendor-n/aInternet Systems Consortium, Inc.Oracle CorporationHP Inc.
Product-solarisbindhp-uxvm_serverlinuxn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2015-5477
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-92.83% / 99.76%
||
7 Day CHG~0.00%
Published-29 Jul, 2015 | 14:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

named in ISC BIND 9.x before 9.9.7-P2 and 9.10.x before 9.10.2-P3 allows remote attackers to cause a denial of service (REQUIRE assertion failure and daemon exit) via TKEY queries.

Action-Not Available
Vendor-n/aInternet Systems Consortium, Inc.
Product-bindn/a
CVE-2015-4620
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-13.88% / 94.05%
||
7 Day CHG~0.00%
Published-08 Jul, 2015 | 14:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

name.c in named in ISC BIND 9.7.x through 9.9.x before 9.9.7-P1 and 9.10.x before 9.10.2-P2, when configured as a recursive resolver with DNSSEC validation, allows remote attackers to cause a denial of service (REQUIRE assertion failure and daemon exit) by constructing crafted zone data and then making a query for a name in that zone.

Action-Not Available
Vendor-n/aInternet Systems Consortium, Inc.
Product-bindn/a
CVE-2008-4163
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-26.70% / 96.15%
||
7 Day CHG~0.00%
Published-22 Sep, 2008 | 17:00
Updated-07 Aug, 2024 | 10:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unspecified vulnerability in ISC BIND 9.3.5-P2-W1, 9.4.2-P2-W1, and 9.5.0-P2-W1 on Windows allows remote attackers to cause a denial of service (UDP client handler termination) via unknown vectors.

Action-Not Available
Vendor-n/aInternet Systems Consortium, Inc.
Product-bindn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2012-4244
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-56.67% / 98.03%
||
7 Day CHG~0.00%
Published-14 Sep, 2012 | 00:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

ISC BIND 9.x before 9.7.6-P3, 9.8.x before 9.8.3-P3, 9.9.x before 9.9.1-P3, and 9.4-ESV and 9.6-ESV before 9.6-ESV-R7-P3 allows remote attackers to cause a denial of service (assertion failure and named daemon exit) via a query for a long resource record.

Action-Not Available
Vendor-n/aInternet Systems Consortium, Inc.
Product-bindn/a
CVE-2011-2748
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-87.79% / 99.44%
||
7 Day CHG~0.00%
Published-15 Aug, 2011 | 21:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The server in ISC DHCP 3.x and 4.x before 4.2.2, 3.1-ESV before 3.1-ESV-R3, and 4.1-ESV before 4.1-ESV-R3 allows remote attackers to cause a denial of service (daemon exit) via a crafted DHCP packet.

Action-Not Available
Vendor-n/aCanonical Ltd.Internet Systems Consortium, Inc.Debian GNU/Linux
Product-ubuntu_linuxdhcpdebian_linuxn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2011-2749
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-75.34% / 98.84%
||
7 Day CHG~0.00%
Published-15 Aug, 2011 | 21:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The server in ISC DHCP 3.x and 4.x before 4.2.2, 3.1-ESV before 3.1-ESV-R3, and 4.1-ESV before 4.1-ESV-R3 allows remote attackers to cause a denial of service (daemon exit) via a crafted BOOTP packet.

Action-Not Available
Vendor-n/aCanonical Ltd.Internet Systems Consortium, Inc.Debian GNU/Linux
Product-ubuntu_linuxdhcpdebian_linuxn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2015-5722
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-50.78% / 97.77%
||
7 Day CHG~0.00%
Published-05 Sep, 2015 | 01:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

buffer.c in named in ISC BIND 9.x before 9.9.7-P3 and 9.10.x before 9.10.2-P4 allows remote attackers to cause a denial of service (assertion failure and daemon exit) by creating a zone containing a malformed DNSSEC key and issuing a query for a name in that zone.

Action-Not Available
Vendor-n/aInternet Systems Consortium, Inc.Apple Inc.
Product-bindmac_os_x_servern/a
CWE ID-CWE-20
Improper Input Validation
Details not found