Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2012-5166

Summary
Assigner-mitre
Assigner Org ID-8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At-10 Oct, 2012 | 21:00
Updated At-06 Aug, 2024 | 20:58
Rejected At-
Credits

ISC BIND 9.x before 9.7.6-P4, 9.8.x before 9.8.3-P4, 9.9.x before 9.9.1-P4, and 9.4-ESV and 9.6-ESV before 9.6-ESV-R7-P4 allows remote attackers to cause a denial of service (named daemon hang) via unspecified combinations of resource records.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:mitre
Assigner Org ID:8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At:10 Oct, 2012 | 21:00
Updated At:06 Aug, 2024 | 20:58
Rejected At:
▼CVE Numbering Authority (CNA)

ISC BIND 9.x before 9.7.6-P4, 9.8.x before 9.8.3-P4, 9.9.x before 9.9.1-P4, and 9.4-ESV and 9.6-ESV before 9.6-ESV-R7-P4 allows remote attackers to cause a denial of service (named daemon hang) via unspecified combinations of resource records.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
x_refsource_CONFIRM
http://www.ibm.com/support/docview.wss?uid=isg1IV30365
vendor-advisory
x_refsource_AIXAPAR
http://www.ibm.com/support/docview.wss?uid=isg1IV30185
vendor-advisory
x_refsource_AIXAPAR
http://rhn.redhat.com/errata/RHSA-2012-1363.html
vendor-advisory
x_refsource_REDHAT
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2012&m=slackware-security.536004
vendor-advisory
x_refsource_SLACKWARE
http://secunia.com/advisories/50909
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/50956
third-party-advisory
x_refsource_SECUNIA
http://osvdb.org/86118
vdb-entry
x_refsource_OSVDB
http://secunia.com/advisories/50903
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/51096
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/51054
third-party-advisory
x_refsource_SECUNIA
http://rhn.redhat.com/errata/RHSA-2012-1365.html
vendor-advisory
x_refsource_REDHAT
http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00013.html
vendor-advisory
x_refsource_SUSE
http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090346.html
vendor-advisory
x_refsource_FEDORA
http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00011.html
vendor-advisory
x_refsource_SUSE
http://www.ibm.com/support/docview.wss?uid=isg1IV30366
vendor-advisory
x_refsource_AIXAPAR
http://www.ibm.com/support/docview.wss?uid=isg1IV30367
vendor-advisory
x_refsource_AIXAPAR
http://www.ibm.com/support/docview.wss?uid=isg1IV30368
vendor-advisory
x_refsource_AIXAPAR
http://secunia.com/advisories/51106
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/51178
third-party-advisory
x_refsource_SECUNIA
http://www.ibm.com/support/docview.wss?uid=isg1IV30247
vendor-advisory
x_refsource_AIXAPAR
http://www.isc.org/software/bind/advisories/cve-2012-5166
x_refsource_CONFIRM
http://www.mandriva.com/security/advisories?name=MDVSA-2012:162
vendor-advisory
x_refsource_MANDRIVA
http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html
vendor-advisory
x_refsource_APPLE
http://secunia.com/advisories/51078
third-party-advisory
x_refsource_SECUNIA
http://rhn.redhat.com/errata/RHSA-2012-1364.html
vendor-advisory
x_refsource_REDHAT
https://kb.isc.org/article/AA-00801
x_refsource_CONFIRM
http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090586.html
vendor-advisory
x_refsource_FEDORA
http://aix.software.ibm.com/aix/efixes/security/bind9_advisory5.asc
x_refsource_CONFIRM
http://www.debian.org/security/2012/dsa-2560
vendor-advisory
x_refsource_DEBIAN
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04952488
x_refsource_CONFIRM
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19706
vdb-entry
signature
x_refsource_OVAL
http://www.securityfocus.com/bid/55852
vdb-entry
x_refsource_BID
http://www.ibm.com/support/docview.wss?uid=isg1IV30364
vendor-advisory
x_refsource_AIXAPAR
https://blogs.oracle.com/sunsecurity/entry/cve_2012_5166_denial_of
x_refsource_CONFIRM
http://support.apple.com/kb/HT5880
x_refsource_CONFIRM
http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090491.html
vendor-advisory
x_refsource_FEDORA
http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf
x_refsource_CONFIRM
Hyperlink: http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.ibm.com/support/docview.wss?uid=isg1IV30365
Resource:
vendor-advisory
x_refsource_AIXAPAR
Hyperlink: http://www.ibm.com/support/docview.wss?uid=isg1IV30185
Resource:
vendor-advisory
x_refsource_AIXAPAR
Hyperlink: http://rhn.redhat.com/errata/RHSA-2012-1363.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://www.slackware.com/security/viewer.php?l=slackware-security&y=2012&m=slackware-security.536004
Resource:
vendor-advisory
x_refsource_SLACKWARE
Hyperlink: http://secunia.com/advisories/50909
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/50956
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://osvdb.org/86118
Resource:
vdb-entry
x_refsource_OSVDB
Hyperlink: http://secunia.com/advisories/50903
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/51096
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/51054
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://rhn.redhat.com/errata/RHSA-2012-1365.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00013.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090346.html
Resource:
vendor-advisory
x_refsource_FEDORA
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00011.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: http://www.ibm.com/support/docview.wss?uid=isg1IV30366
Resource:
vendor-advisory
x_refsource_AIXAPAR
Hyperlink: http://www.ibm.com/support/docview.wss?uid=isg1IV30367
Resource:
vendor-advisory
x_refsource_AIXAPAR
Hyperlink: http://www.ibm.com/support/docview.wss?uid=isg1IV30368
Resource:
vendor-advisory
x_refsource_AIXAPAR
Hyperlink: http://secunia.com/advisories/51106
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/51178
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.ibm.com/support/docview.wss?uid=isg1IV30247
Resource:
vendor-advisory
x_refsource_AIXAPAR
Hyperlink: http://www.isc.org/software/bind/advisories/cve-2012-5166
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2012:162
Resource:
vendor-advisory
x_refsource_MANDRIVA
Hyperlink: http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html
Resource:
vendor-advisory
x_refsource_APPLE
Hyperlink: http://secunia.com/advisories/51078
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://rhn.redhat.com/errata/RHSA-2012-1364.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://kb.isc.org/article/AA-00801
Resource:
x_refsource_CONFIRM
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090586.html
Resource:
vendor-advisory
x_refsource_FEDORA
Hyperlink: http://aix.software.ibm.com/aix/efixes/security/bind9_advisory5.asc
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.debian.org/security/2012/dsa-2560
Resource:
vendor-advisory
x_refsource_DEBIAN
Hyperlink: https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04952488
Resource:
x_refsource_CONFIRM
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19706
Resource:
vdb-entry
signature
x_refsource_OVAL
Hyperlink: http://www.securityfocus.com/bid/55852
Resource:
vdb-entry
x_refsource_BID
Hyperlink: http://www.ibm.com/support/docview.wss?uid=isg1IV30364
Resource:
vendor-advisory
x_refsource_AIXAPAR
Hyperlink: https://blogs.oracle.com/sunsecurity/entry/cve_2012_5166_denial_of
Resource:
x_refsource_CONFIRM
Hyperlink: http://support.apple.com/kb/HT5880
Resource:
x_refsource_CONFIRM
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090491.html
Resource:
vendor-advisory
x_refsource_FEDORA
Hyperlink: http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf
Resource:
x_refsource_CONFIRM
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
x_refsource_CONFIRM
x_transferred
http://www.ibm.com/support/docview.wss?uid=isg1IV30365
vendor-advisory
x_refsource_AIXAPAR
x_transferred
http://www.ibm.com/support/docview.wss?uid=isg1IV30185
vendor-advisory
x_refsource_AIXAPAR
x_transferred
http://rhn.redhat.com/errata/RHSA-2012-1363.html
vendor-advisory
x_refsource_REDHAT
x_transferred
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2012&m=slackware-security.536004
vendor-advisory
x_refsource_SLACKWARE
x_transferred
http://secunia.com/advisories/50909
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/50956
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://osvdb.org/86118
vdb-entry
x_refsource_OSVDB
x_transferred
http://secunia.com/advisories/50903
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/51096
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/51054
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://rhn.redhat.com/errata/RHSA-2012-1365.html
vendor-advisory
x_refsource_REDHAT
x_transferred
http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00013.html
vendor-advisory
x_refsource_SUSE
x_transferred
http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090346.html
vendor-advisory
x_refsource_FEDORA
x_transferred
http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00011.html
vendor-advisory
x_refsource_SUSE
x_transferred
http://www.ibm.com/support/docview.wss?uid=isg1IV30366
vendor-advisory
x_refsource_AIXAPAR
x_transferred
http://www.ibm.com/support/docview.wss?uid=isg1IV30367
vendor-advisory
x_refsource_AIXAPAR
x_transferred
http://www.ibm.com/support/docview.wss?uid=isg1IV30368
vendor-advisory
x_refsource_AIXAPAR
x_transferred
http://secunia.com/advisories/51106
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/51178
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.ibm.com/support/docview.wss?uid=isg1IV30247
vendor-advisory
x_refsource_AIXAPAR
x_transferred
http://www.isc.org/software/bind/advisories/cve-2012-5166
x_refsource_CONFIRM
x_transferred
http://www.mandriva.com/security/advisories?name=MDVSA-2012:162
vendor-advisory
x_refsource_MANDRIVA
x_transferred
http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html
vendor-advisory
x_refsource_APPLE
x_transferred
http://secunia.com/advisories/51078
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://rhn.redhat.com/errata/RHSA-2012-1364.html
vendor-advisory
x_refsource_REDHAT
x_transferred
https://kb.isc.org/article/AA-00801
x_refsource_CONFIRM
x_transferred
http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090586.html
vendor-advisory
x_refsource_FEDORA
x_transferred
http://aix.software.ibm.com/aix/efixes/security/bind9_advisory5.asc
x_refsource_CONFIRM
x_transferred
http://www.debian.org/security/2012/dsa-2560
vendor-advisory
x_refsource_DEBIAN
x_transferred
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04952488
x_refsource_CONFIRM
x_transferred
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19706
vdb-entry
signature
x_refsource_OVAL
x_transferred
http://www.securityfocus.com/bid/55852
vdb-entry
x_refsource_BID
x_transferred
http://www.ibm.com/support/docview.wss?uid=isg1IV30364
vendor-advisory
x_refsource_AIXAPAR
x_transferred
https://blogs.oracle.com/sunsecurity/entry/cve_2012_5166_denial_of
x_refsource_CONFIRM
x_transferred
http://support.apple.com/kb/HT5880
x_refsource_CONFIRM
x_transferred
http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090491.html
vendor-advisory
x_refsource_FEDORA
x_transferred
http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.ibm.com/support/docview.wss?uid=isg1IV30365
Resource:
vendor-advisory
x_refsource_AIXAPAR
x_transferred
Hyperlink: http://www.ibm.com/support/docview.wss?uid=isg1IV30185
Resource:
vendor-advisory
x_refsource_AIXAPAR
x_transferred
Hyperlink: http://rhn.redhat.com/errata/RHSA-2012-1363.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://www.slackware.com/security/viewer.php?l=slackware-security&y=2012&m=slackware-security.536004
Resource:
vendor-advisory
x_refsource_SLACKWARE
x_transferred
Hyperlink: http://secunia.com/advisories/50909
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/50956
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://osvdb.org/86118
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: http://secunia.com/advisories/50903
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/51096
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/51054
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://rhn.redhat.com/errata/RHSA-2012-1365.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00013.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090346.html
Resource:
vendor-advisory
x_refsource_FEDORA
x_transferred
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00011.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: http://www.ibm.com/support/docview.wss?uid=isg1IV30366
Resource:
vendor-advisory
x_refsource_AIXAPAR
x_transferred
Hyperlink: http://www.ibm.com/support/docview.wss?uid=isg1IV30367
Resource:
vendor-advisory
x_refsource_AIXAPAR
x_transferred
Hyperlink: http://www.ibm.com/support/docview.wss?uid=isg1IV30368
Resource:
vendor-advisory
x_refsource_AIXAPAR
x_transferred
Hyperlink: http://secunia.com/advisories/51106
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/51178
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.ibm.com/support/docview.wss?uid=isg1IV30247
Resource:
vendor-advisory
x_refsource_AIXAPAR
x_transferred
Hyperlink: http://www.isc.org/software/bind/advisories/cve-2012-5166
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2012:162
Resource:
vendor-advisory
x_refsource_MANDRIVA
x_transferred
Hyperlink: http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html
Resource:
vendor-advisory
x_refsource_APPLE
x_transferred
Hyperlink: http://secunia.com/advisories/51078
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://rhn.redhat.com/errata/RHSA-2012-1364.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: https://kb.isc.org/article/AA-00801
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090586.html
Resource:
vendor-advisory
x_refsource_FEDORA
x_transferred
Hyperlink: http://aix.software.ibm.com/aix/efixes/security/bind9_advisory5.asc
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.debian.org/security/2012/dsa-2560
Resource:
vendor-advisory
x_refsource_DEBIAN
x_transferred
Hyperlink: https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04952488
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19706
Resource:
vdb-entry
signature
x_refsource_OVAL
x_transferred
Hyperlink: http://www.securityfocus.com/bid/55852
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: http://www.ibm.com/support/docview.wss?uid=isg1IV30364
Resource:
vendor-advisory
x_refsource_AIXAPAR
x_transferred
Hyperlink: https://blogs.oracle.com/sunsecurity/entry/cve_2012_5166_denial_of
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://support.apple.com/kb/HT5880
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090491.html
Resource:
vendor-advisory
x_refsource_FEDORA
x_transferred
Hyperlink: http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf
Resource:
x_refsource_CONFIRM
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:cve@mitre.org
Published At:10 Oct, 2012 | 21:55
Updated At:11 Apr, 2025 | 00:51

ISC BIND 9.x before 9.7.6-P4, 9.8.x before 9.8.3-P4, 9.9.x before 9.9.1-P4, and 9.4-ESV and 9.6-ESV before 9.6-ESV-R7-P4 allows remote attackers to cause a denial of service (named daemon hang) via unspecified combinations of resource records.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.07.8HIGH
AV:N/AC:L/Au:N/C:N/I:N/A:C
Type: Primary
Version: 2.0
Base score: 7.8
Base severity: HIGH
Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:C
CPE Matches

Internet Systems Consortium, Inc.
isc
>>bind>>9.0
cpe:2.3:a:isc:bind:9.0:*:*:*:*:*:*:*
Internet Systems Consortium, Inc.
isc
>>bind>>9.0.0
cpe:2.3:a:isc:bind:9.0.0:rc1:*:*:*:*:*:*
Internet Systems Consortium, Inc.
isc
>>bind>>9.0.0
cpe:2.3:a:isc:bind:9.0.0:rc2:*:*:*:*:*:*
Internet Systems Consortium, Inc.
isc
>>bind>>9.0.0
cpe:2.3:a:isc:bind:9.0.0:rc3:*:*:*:*:*:*
Internet Systems Consortium, Inc.
isc
>>bind>>9.0.0
cpe:2.3:a:isc:bind:9.0.0:rc4:*:*:*:*:*:*
Internet Systems Consortium, Inc.
isc
>>bind>>9.0.0
cpe:2.3:a:isc:bind:9.0.0:rc5:*:*:*:*:*:*
Internet Systems Consortium, Inc.
isc
>>bind>>9.0.0
cpe:2.3:a:isc:bind:9.0.0:rc6:*:*:*:*:*:*
Internet Systems Consortium, Inc.
isc
>>bind>>9.0.1
cpe:2.3:a:isc:bind:9.0.1:*:*:*:*:*:*:*
Internet Systems Consortium, Inc.
isc
>>bind>>9.0.1
cpe:2.3:a:isc:bind:9.0.1:rc1:*:*:*:*:*:*
Internet Systems Consortium, Inc.
isc
>>bind>>9.0.1
cpe:2.3:a:isc:bind:9.0.1:rc2:*:*:*:*:*:*
Internet Systems Consortium, Inc.
isc
>>bind>>9.1
cpe:2.3:a:isc:bind:9.1:*:*:*:*:*:*:*
Internet Systems Consortium, Inc.
isc
>>bind>>9.1.0
cpe:2.3:a:isc:bind:9.1.0:rc1:*:*:*:*:*:*
Internet Systems Consortium, Inc.
isc
>>bind>>9.1.1
cpe:2.3:a:isc:bind:9.1.1:*:*:*:*:*:*:*
Internet Systems Consortium, Inc.
isc
>>bind>>9.1.1
cpe:2.3:a:isc:bind:9.1.1:rc1:*:*:*:*:*:*
Internet Systems Consortium, Inc.
isc
>>bind>>9.1.1
cpe:2.3:a:isc:bind:9.1.1:rc2:*:*:*:*:*:*
Internet Systems Consortium, Inc.
isc
>>bind>>9.1.1
cpe:2.3:a:isc:bind:9.1.1:rc3:*:*:*:*:*:*
Internet Systems Consortium, Inc.
isc
>>bind>>9.1.1
cpe:2.3:a:isc:bind:9.1.1:rc4:*:*:*:*:*:*
Internet Systems Consortium, Inc.
isc
>>bind>>9.1.1
cpe:2.3:a:isc:bind:9.1.1:rc5:*:*:*:*:*:*
Internet Systems Consortium, Inc.
isc
>>bind>>9.1.1
cpe:2.3:a:isc:bind:9.1.1:rc6:*:*:*:*:*:*
Internet Systems Consortium, Inc.
isc
>>bind>>9.1.1
cpe:2.3:a:isc:bind:9.1.1:rc7:*:*:*:*:*:*
Internet Systems Consortium, Inc.
isc
>>bind>>9.1.2
cpe:2.3:a:isc:bind:9.1.2:*:*:*:*:*:*:*
Internet Systems Consortium, Inc.
isc
>>bind>>9.1.2
cpe:2.3:a:isc:bind:9.1.2:rc1:*:*:*:*:*:*
Internet Systems Consortium, Inc.
isc
>>bind>>9.1.3
cpe:2.3:a:isc:bind:9.1.3:*:*:*:*:*:*:*
Internet Systems Consortium, Inc.
isc
>>bind>>9.1.3
cpe:2.3:a:isc:bind:9.1.3:rc1:*:*:*:*:*:*
Internet Systems Consortium, Inc.
isc
>>bind>>9.1.3
cpe:2.3:a:isc:bind:9.1.3:rc2:*:*:*:*:*:*
Internet Systems Consortium, Inc.
isc
>>bind>>9.1.3
cpe:2.3:a:isc:bind:9.1.3:rc3:*:*:*:*:*:*
Internet Systems Consortium, Inc.
isc
>>bind>>9.2.0
cpe:2.3:a:isc:bind:9.2.0:*:*:*:*:*:*:*
Internet Systems Consortium, Inc.
isc
>>bind>>9.2.0
cpe:2.3:a:isc:bind:9.2.0:a1:*:*:*:*:*:*
Internet Systems Consortium, Inc.
isc
>>bind>>9.2.0
cpe:2.3:a:isc:bind:9.2.0:a2:*:*:*:*:*:*
Internet Systems Consortium, Inc.
isc
>>bind>>9.2.0
cpe:2.3:a:isc:bind:9.2.0:a3:*:*:*:*:*:*
Internet Systems Consortium, Inc.
isc
>>bind>>9.2.0
cpe:2.3:a:isc:bind:9.2.0:b1:*:*:*:*:*:*
Internet Systems Consortium, Inc.
isc
>>bind>>9.2.0
cpe:2.3:a:isc:bind:9.2.0:b2:*:*:*:*:*:*
Internet Systems Consortium, Inc.
isc
>>bind>>9.2.0
cpe:2.3:a:isc:bind:9.2.0:rc1:*:*:*:*:*:*
Internet Systems Consortium, Inc.
isc
>>bind>>9.2.0
cpe:2.3:a:isc:bind:9.2.0:rc10:*:*:*:*:*:*
Internet Systems Consortium, Inc.
isc
>>bind>>9.2.0
cpe:2.3:a:isc:bind:9.2.0:rc2:*:*:*:*:*:*
Internet Systems Consortium, Inc.
isc
>>bind>>9.2.0
cpe:2.3:a:isc:bind:9.2.0:rc3:*:*:*:*:*:*
Internet Systems Consortium, Inc.
isc
>>bind>>9.2.0
cpe:2.3:a:isc:bind:9.2.0:rc4:*:*:*:*:*:*
Internet Systems Consortium, Inc.
isc
>>bind>>9.2.0
cpe:2.3:a:isc:bind:9.2.0:rc5:*:*:*:*:*:*
Internet Systems Consortium, Inc.
isc
>>bind>>9.2.0
cpe:2.3:a:isc:bind:9.2.0:rc6:*:*:*:*:*:*
Internet Systems Consortium, Inc.
isc
>>bind>>9.2.0
cpe:2.3:a:isc:bind:9.2.0:rc7:*:*:*:*:*:*
Internet Systems Consortium, Inc.
isc
>>bind>>9.2.0
cpe:2.3:a:isc:bind:9.2.0:rc8:*:*:*:*:*:*
Internet Systems Consortium, Inc.
isc
>>bind>>9.2.0
cpe:2.3:a:isc:bind:9.2.0:rc9:*:*:*:*:*:*
Internet Systems Consortium, Inc.
isc
>>bind>>9.2.1
cpe:2.3:a:isc:bind:9.2.1:*:*:*:*:*:*:*
Internet Systems Consortium, Inc.
isc
>>bind>>9.2.1
cpe:2.3:a:isc:bind:9.2.1:rc1:*:*:*:*:*:*
Internet Systems Consortium, Inc.
isc
>>bind>>9.2.1
cpe:2.3:a:isc:bind:9.2.1:rc2:*:*:*:*:*:*
Internet Systems Consortium, Inc.
isc
>>bind>>9.2.2
cpe:2.3:a:isc:bind:9.2.2:*:*:*:*:*:*:*
Internet Systems Consortium, Inc.
isc
>>bind>>9.2.2
cpe:2.3:a:isc:bind:9.2.2:p2:*:*:*:*:*:*
Internet Systems Consortium, Inc.
isc
>>bind>>9.2.2
cpe:2.3:a:isc:bind:9.2.2:p3:*:*:*:*:*:*
Internet Systems Consortium, Inc.
isc
>>bind>>9.2.2
cpe:2.3:a:isc:bind:9.2.2:rc1:*:*:*:*:*:*
Internet Systems Consortium, Inc.
isc
>>bind>>9.2.3
cpe:2.3:a:isc:bind:9.2.3:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-189Primarynvd@nist.gov
CWE ID: CWE-189
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://aix.software.ibm.com/aix/efixes/security/bind9_advisory5.asccve@mitre.org
N/A
http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.htmlcve@mitre.org
N/A
http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090346.htmlcve@mitre.org
N/A
http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090491.htmlcve@mitre.org
N/A
http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090586.htmlcve@mitre.org
N/A
http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00011.htmlcve@mitre.org
N/A
http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00013.htmlcve@mitre.org
N/A
http://osvdb.org/86118cve@mitre.org
N/A
http://rhn.redhat.com/errata/RHSA-2012-1363.htmlcve@mitre.org
N/A
http://rhn.redhat.com/errata/RHSA-2012-1364.htmlcve@mitre.org
N/A
http://rhn.redhat.com/errata/RHSA-2012-1365.htmlcve@mitre.org
N/A
http://secunia.com/advisories/50903cve@mitre.org
N/A
http://secunia.com/advisories/50909cve@mitre.org
N/A
http://secunia.com/advisories/50956cve@mitre.org
N/A
http://secunia.com/advisories/51054cve@mitre.org
N/A
http://secunia.com/advisories/51078cve@mitre.org
N/A
http://secunia.com/advisories/51096cve@mitre.org
N/A
http://secunia.com/advisories/51106cve@mitre.org
N/A
http://secunia.com/advisories/51178cve@mitre.org
N/A
http://support.apple.com/kb/HT5880cve@mitre.org
N/A
http://www.debian.org/security/2012/dsa-2560cve@mitre.org
N/A
http://www.ibm.com/support/docview.wss?uid=isg1IV30185cve@mitre.org
N/A
http://www.ibm.com/support/docview.wss?uid=isg1IV30247cve@mitre.org
N/A
http://www.ibm.com/support/docview.wss?uid=isg1IV30364cve@mitre.org
N/A
http://www.ibm.com/support/docview.wss?uid=isg1IV30365cve@mitre.org
N/A
http://www.ibm.com/support/docview.wss?uid=isg1IV30366cve@mitre.org
N/A
http://www.ibm.com/support/docview.wss?uid=isg1IV30367cve@mitre.org
N/A
http://www.ibm.com/support/docview.wss?uid=isg1IV30368cve@mitre.org
N/A
http://www.isc.org/software/bind/advisories/cve-2012-5166cve@mitre.org
N/A
http://www.mandriva.com/security/advisories?name=MDVSA-2012:162cve@mitre.org
N/A
http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.htmlcve@mitre.org
N/A
http://www.securityfocus.com/bid/55852cve@mitre.org
N/A
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2012&m=slackware-security.536004cve@mitre.org
N/A
http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdfcve@mitre.org
N/A
https://blogs.oracle.com/sunsecurity/entry/cve_2012_5166_denial_ofcve@mitre.org
N/A
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04952488cve@mitre.org
N/A
https://kb.isc.org/article/AA-00801cve@mitre.org
Vendor Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19706cve@mitre.org
N/A
http://aix.software.ibm.com/aix/efixes/security/bind9_advisory5.ascaf854a3a-2127-422b-91ae-364da2661108
N/A
http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090346.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090491.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090586.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00011.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00013.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://osvdb.org/86118af854a3a-2127-422b-91ae-364da2661108
N/A
http://rhn.redhat.com/errata/RHSA-2012-1363.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://rhn.redhat.com/errata/RHSA-2012-1364.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://rhn.redhat.com/errata/RHSA-2012-1365.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/50903af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/50909af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/50956af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/51054af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/51078af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/51096af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/51106af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/51178af854a3a-2127-422b-91ae-364da2661108
N/A
http://support.apple.com/kb/HT5880af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.debian.org/security/2012/dsa-2560af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.ibm.com/support/docview.wss?uid=isg1IV30185af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.ibm.com/support/docview.wss?uid=isg1IV30247af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.ibm.com/support/docview.wss?uid=isg1IV30364af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.ibm.com/support/docview.wss?uid=isg1IV30365af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.ibm.com/support/docview.wss?uid=isg1IV30366af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.ibm.com/support/docview.wss?uid=isg1IV30367af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.ibm.com/support/docview.wss?uid=isg1IV30368af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.isc.org/software/bind/advisories/cve-2012-5166af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.mandriva.com/security/advisories?name=MDVSA-2012:162af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.securityfocus.com/bid/55852af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2012&m=slackware-security.536004af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdfaf854a3a-2127-422b-91ae-364da2661108
N/A
https://blogs.oracle.com/sunsecurity/entry/cve_2012_5166_denial_ofaf854a3a-2127-422b-91ae-364da2661108
N/A
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04952488af854a3a-2127-422b-91ae-364da2661108
N/A
https://kb.isc.org/article/AA-00801af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19706af854a3a-2127-422b-91ae-364da2661108
N/A
Hyperlink: http://aix.software.ibm.com/aix/efixes/security/bind9_advisory5.asc
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090346.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090491.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090586.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00011.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00013.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://osvdb.org/86118
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://rhn.redhat.com/errata/RHSA-2012-1363.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://rhn.redhat.com/errata/RHSA-2012-1364.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://rhn.redhat.com/errata/RHSA-2012-1365.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/50903
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/50909
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/50956
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/51054
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/51078
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/51096
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/51106
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/51178
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://support.apple.com/kb/HT5880
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.debian.org/security/2012/dsa-2560
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.ibm.com/support/docview.wss?uid=isg1IV30185
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.ibm.com/support/docview.wss?uid=isg1IV30247
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.ibm.com/support/docview.wss?uid=isg1IV30364
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.ibm.com/support/docview.wss?uid=isg1IV30365
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.ibm.com/support/docview.wss?uid=isg1IV30366
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.ibm.com/support/docview.wss?uid=isg1IV30367
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.ibm.com/support/docview.wss?uid=isg1IV30368
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.isc.org/software/bind/advisories/cve-2012-5166
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2012:162
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.securityfocus.com/bid/55852
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.slackware.com/security/viewer.php?l=slackware-security&y=2012&m=slackware-security.536004
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://blogs.oracle.com/sunsecurity/entry/cve_2012_5166_denial_of
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04952488
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://kb.isc.org/article/AA-00801
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19706
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://aix.software.ibm.com/aix/efixes/security/bind9_advisory5.asc
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090346.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090491.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090586.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00011.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00013.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://osvdb.org/86118
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://rhn.redhat.com/errata/RHSA-2012-1363.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://rhn.redhat.com/errata/RHSA-2012-1364.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://rhn.redhat.com/errata/RHSA-2012-1365.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/50903
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/50909
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/50956
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/51054
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/51078
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/51096
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/51106
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/51178
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://support.apple.com/kb/HT5880
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.debian.org/security/2012/dsa-2560
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.ibm.com/support/docview.wss?uid=isg1IV30185
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.ibm.com/support/docview.wss?uid=isg1IV30247
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.ibm.com/support/docview.wss?uid=isg1IV30364
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.ibm.com/support/docview.wss?uid=isg1IV30365
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.ibm.com/support/docview.wss?uid=isg1IV30366
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.ibm.com/support/docview.wss?uid=isg1IV30367
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.ibm.com/support/docview.wss?uid=isg1IV30368
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.isc.org/software/bind/advisories/cve-2012-5166
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2012:162
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.securityfocus.com/bid/55852
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.slackware.com/security/viewer.php?l=slackware-security&y=2012&m=slackware-security.536004
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://blogs.oracle.com/sunsecurity/entry/cve_2012_5166_denial_of
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04952488
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://kb.isc.org/article/AA-00801
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19706
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

16Records found

CVE-2011-2748
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-87.79% / 99.44%
||
7 Day CHG~0.00%
Published-15 Aug, 2011 | 21:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The server in ISC DHCP 3.x and 4.x before 4.2.2, 3.1-ESV before 3.1-ESV-R3, and 4.1-ESV before 4.1-ESV-R3 allows remote attackers to cause a denial of service (daemon exit) via a crafted DHCP packet.

Action-Not Available
Vendor-n/aCanonical Ltd.Internet Systems Consortium, Inc.Debian GNU/Linux
Product-ubuntu_linuxdhcpdebian_linuxn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2011-2749
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-75.34% / 98.84%
||
7 Day CHG~0.00%
Published-15 Aug, 2011 | 21:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The server in ISC DHCP 3.x and 4.x before 4.2.2, 3.1-ESV before 3.1-ESV-R3, and 4.1-ESV before 4.1-ESV-R3 allows remote attackers to cause a denial of service (daemon exit) via a crafted BOOTP packet.

Action-Not Available
Vendor-n/aCanonical Ltd.Internet Systems Consortium, Inc.Debian GNU/Linux
Product-ubuntu_linuxdhcpdebian_linuxn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2015-5477
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-92.83% / 99.76%
||
7 Day CHG~0.00%
Published-29 Jul, 2015 | 14:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

named in ISC BIND 9.x before 9.9.7-P2 and 9.10.x before 9.10.2-P3 allows remote attackers to cause a denial of service (REQUIRE assertion failure and daemon exit) via TKEY queries.

Action-Not Available
Vendor-n/aInternet Systems Consortium, Inc.
Product-bindn/a
CVE-2014-8500
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-43.82% / 97.44%
||
7 Day CHG~0.00%
Published-11 Dec, 2014 | 02:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

ISC BIND 9.0.x through 9.8.x, 9.9.0 through 9.9.6, and 9.10.0 through 9.10.1 does not limit delegation chaining, which allows remote attackers to cause a denial of service (memory consumption and named crash) via a large or infinite number of referrals.

Action-Not Available
Vendor-n/aInternet Systems Consortium, Inc.
Product-bindn/a
CVE-2013-4854
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-70.18% / 98.62%
||
7 Day CHG~0.00%
Published-26 Jul, 2013 | 23:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The RFC 5011 implementation in rdata.c in ISC BIND 9.7.x and 9.8.x before 9.8.5-P2, 9.8.6b1, 9.9.x before 9.9.3-P2, and 9.9.4b1, and DNSco BIND 9.9.3-S1 before 9.9.3-S1-P1 and 9.9.4-S1b1, allows remote attackers to cause a denial of service (assertion failure and named daemon exit) via a query with a malformed RDATA section that is not properly handled during construction of a log message, as exploited in the wild in July 2013.

Action-Not Available
Vendor-n/aNovellFreeBSD FoundationInternet Systems Consortium, Inc.Mandriva (Mandrakesoft)Fedora ProjectSlackwareHP Inc.Red Hat, Inc.SUSEopenSUSE
Product-enterprise_linuxdnsco_bindfreebsdfedoraopensusebindsuse_linuxhp-uxslackware_linuxbusiness_serversuse_linux_enterprise_software_development_kitenterprise_servern/a
CVE-2013-3919
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-9.73% / 92.62%
||
7 Day CHG~0.00%
Published-06 Jun, 2013 | 10:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

resolver.c in ISC BIND 9.8.5 before 9.8.5-P1, 9.9.3 before 9.9.3-P1, and 9.6-ESV-R9 before 9.6-ESV-R9-P1, when a recursive resolver is configured, allows remote attackers to cause a denial of service (assertion failure and named daemon exit) via a query for a record in a malformed zone.

Action-Not Available
Vendor-n/aInternet Systems Consortium, Inc.
Product-bindn/a
CVE-2008-4163
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-26.70% / 96.15%
||
7 Day CHG~0.00%
Published-22 Sep, 2008 | 17:00
Updated-07 Aug, 2024 | 10:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unspecified vulnerability in ISC BIND 9.3.5-P2-W1, 9.4.2-P2-W1, and 9.5.0-P2-W1 on Windows allows remote attackers to cause a denial of service (UDP client handler termination) via unknown vectors.

Action-Not Available
Vendor-n/aInternet Systems Consortium, Inc.
Product-bindn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2013-2266
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-41.45% / 97.31%
||
7 Day CHG~0.00%
Published-28 Mar, 2013 | 16:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

libdns in ISC BIND 9.7.x and 9.8.x before 9.8.4-P2, 9.8.5 before 9.8.5b2, 9.9.x before 9.9.2-P2, and 9.9.3 before 9.9.3b2 on UNIX platforms allows remote attackers to cause a denial of service (memory consumption) via a crafted regular expression, as demonstrated by a memory-exhaustion attack against a machine running a named process.

Action-Not Available
Vendor-n/aInternet Systems Consortium, Inc.
Product-bindn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2012-5688
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-6.26% / 90.53%
||
7 Day CHG-6.70%
Published-06 Dec, 2012 | 11:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

ISC BIND 9.8.x before 9.8.4-P1 and 9.9.x before 9.9.2-P1, when DNS64 is enabled, allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a crafted query.

Action-Not Available
Vendor-n/aCanonical Ltd.Internet Systems Consortium, Inc.
Product-bindubuntu_linuxn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2012-4244
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-56.67% / 98.03%
||
7 Day CHG~0.00%
Published-14 Sep, 2012 | 00:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

ISC BIND 9.x before 9.7.6-P3, 9.8.x before 9.8.3-P3, 9.9.x before 9.9.1-P3, and 9.4-ESV and 9.6-ESV before 9.6-ESV-R7-P3 allows remote attackers to cause a denial of service (assertion failure and named daemon exit) via a query for a long resource record.

Action-Not Available
Vendor-n/aInternet Systems Consortium, Inc.
Product-bindn/a
CVE-2012-3817
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-3.99% / 87.95%
||
7 Day CHG~0.00%
Published-25 Jul, 2012 | 10:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

ISC BIND 9.4.x, 9.5.x, 9.6.x, and 9.7.x before 9.7.6-P2; 9.8.x before 9.8.3-P2; 9.9.x before 9.9.1-P2; and 9.6-ESV before 9.6-ESV-R7-P2, when DNSSEC validation is enabled, does not properly initialize the failing-query cache, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) by sending many queries.

Action-Not Available
Vendor-n/aInternet Systems Consortium, Inc.
Product-bindn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2007-0493
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-7.8||HIGH
EPSS-15.34% / 94.36%
||
7 Day CHG~0.00%
Published-25 Jan, 2007 | 20:00
Updated-07 Aug, 2024 | 12:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Use-after-free vulnerability in ISC BIND 9.3.0 up to 9.3.3, 9.4.0a1 up to 9.4.0a6, 9.4.0b1 up to 9.4.0b4, 9.4.0rc1, and 9.5.0a1 (Bind Forum only) allows remote attackers to cause a denial of service (named daemon crash) via unspecified vectors that cause named to "dereference a freed fetch context."

Action-Not Available
Vendor-n/aInternet Systems Consortium, Inc.
Product-bindn/a
CVE-2011-0413
Matching Score-8
Assigner-CERT/CC
ShareView Details
Matching Score-8
Assigner-CERT/CC
CVSS Score-7.8||HIGH
EPSS-11.21% / 93.23%
||
7 Day CHG~0.00%
Published-31 Jan, 2011 | 20:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The DHCPv6 server in ISC DHCP 4.0.x and 4.1.x before 4.1.2-P1, 4.0-ESV and 4.1-ESV before 4.1-ESV-R1, and 4.2.x before 4.2.1b1 allows remote attackers to cause a denial of service (assertion failure and daemon crash) by sending a message over IPv6 for a declined and abandoned address.

Action-Not Available
Vendor-n/aInternet Systems Consortium, Inc.
Product-dhcpn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2016-2776
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-90.73% / 99.60%
||
7 Day CHG~0.00%
Published-28 Sep, 2016 | 10:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

buffer.c in named in ISC BIND 9 before 9.9.9-P3, 9.10.x before 9.10.4-P3, and 9.11.x before 9.11.0rc3 does not properly construct responses, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a crafted query.

Action-Not Available
Vendor-n/aInternet Systems Consortium, Inc.Oracle CorporationHP Inc.
Product-solarisbindhp-uxvm_serverlinuxn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2015-5722
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-50.78% / 97.77%
||
7 Day CHG~0.00%
Published-05 Sep, 2015 | 01:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

buffer.c in named in ISC BIND 9.x before 9.9.7-P3 and 9.10.x before 9.10.2-P4 allows remote attackers to cause a denial of service (assertion failure and daemon exit) by creating a zone containing a malformed DNSSEC key and issuing a query for a name in that zone.

Action-Not Available
Vendor-n/aInternet Systems Consortium, Inc.Apple Inc.
Product-bindmac_os_x_servern/a
CWE ID-CWE-20
Improper Input Validation
CVE-2015-4620
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-13.88% / 94.05%
||
7 Day CHG~0.00%
Published-08 Jul, 2015 | 14:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

name.c in named in ISC BIND 9.7.x through 9.9.x before 9.9.7-P1 and 9.10.x before 9.10.2-P2, when configured as a recursive resolver with DNSSEC validation, allows remote attackers to cause a denial of service (REQUIRE assertion failure and daemon exit) by constructing crafted zone data and then making a query for a name in that zone.

Action-Not Available
Vendor-n/aInternet Systems Consortium, Inc.
Product-bindn/a
Details not found