ISC BIND 9.0.x through 9.3.x, 9.4 before 9.4.3-P5, 9.5 before 9.5.2-P2, 9.6 before 9.6.1-P3, and 9.7.0 beta handles out-of-bailiwick data accompanying a secure response without re-fetching from the original source, which allows remote attackers to have an unspecified impact via a crafted response, aka Bug 20819. NOTE: this vulnerability exists because of a regression during the fix for CVE-2009-4022.
| Version | Base score | Base severity | Vector |
|---|
| Hyperlink | Resource Type |
|---|
ISC BIND 9.0.x through 9.3.x, 9.4 before 9.4.3-P5, 9.5 before 9.5.2-P2, 9.6 before 9.6.1-P3, and 9.7.0 beta handles out-of-bailiwick data accompanying a secure response without re-fetching from the original source, which allows remote attackers to have an unspecified impact via a crafted response, aka Bug 20819. NOTE: this vulnerability exists because of a regression during the fix for CVE-2009-4022.
| Type | CWE ID | Description |
|---|---|---|
| text | N/A | n/a |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|
| Hyperlink | Resource |
|---|---|
| https://www.isc.org/advisories/CVE-2009-4022v6 | x_refsource_CONFIRM |
| https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7086 | vdb-entry signature x_refsource_OVAL |
| http://www.vupen.com/english/advisories/2010/1352 | vdb-entry x_refsource_VUPEN |
| http://secunia.com/advisories/40086 | third-party-advisory x_refsource_SECUNIA |
| http://www.vupen.com/english/advisories/2010/0622 | vdb-entry x_refsource_VUPEN |
| https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6665 | vdb-entry signature x_refsource_OVAL |
| http://wiki.rpath.com/wiki/Advisories:rPSA-2010-0018 | x_refsource_CONFIRM |
| http://www.debian.org/security/2010/dsa-2054 | vendor-advisory x_refsource_DEBIAN |
| https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11753 | vdb-entry signature x_refsource_OVAL |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|
| Hyperlink | Resource |
|---|---|
| https://www.isc.org/advisories/CVE-2009-4022v6 | x_refsource_CONFIRM x_transferred |
| https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7086 | vdb-entry signature x_refsource_OVAL x_transferred |
| http://www.vupen.com/english/advisories/2010/1352 | vdb-entry x_refsource_VUPEN x_transferred |
| http://secunia.com/advisories/40086 | third-party-advisory x_refsource_SECUNIA x_transferred |
| http://www.vupen.com/english/advisories/2010/0622 | vdb-entry x_refsource_VUPEN x_transferred |
| https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6665 | vdb-entry signature x_refsource_OVAL x_transferred |
| http://wiki.rpath.com/wiki/Advisories:rPSA-2010-0018 | x_refsource_CONFIRM x_transferred |
| http://www.debian.org/security/2010/dsa-2054 | vendor-advisory x_refsource_DEBIAN x_transferred |
| https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11753 | vdb-entry signature x_refsource_OVAL x_transferred |
ISC BIND 9.0.x through 9.3.x, 9.4 before 9.4.3-P5, 9.5 before 9.5.2-P2, 9.6 before 9.6.1-P3, and 9.7.0 beta handles out-of-bailiwick data accompanying a secure response without re-fetching from the original source, which allows remote attackers to have an unspecified impact via a crafted response, aka Bug 20819. NOTE: this vulnerability exists because of a regression during the fix for CVE-2009-4022.
| Date Added | Due Date | Vulnerability Name | Required Action |
|---|---|---|---|
| N/A |
| Type | Version | Base score | Base severity | Vector |
|---|---|---|---|---|
| Primary | 2.0 | 7.6 | HIGH | AV:N/AC:H/Au:N/C:C/I:C/A:C |
| CWE ID | Type | Source |
|---|---|---|
| NVD-CWE-noinfo | Primary | nvd@nist.gov |