fkie_cve-2012-3817
Vulnerability from fkie_nvd
Published
2012-07-25 10:42
Modified
2024-11-21 01:41
Severity ?
Summary
ISC BIND 9.4.x, 9.5.x, 9.6.x, and 9.7.x before 9.7.6-P2; 9.8.x before 9.8.3-P2; 9.9.x before 9.9.1-P2; and 9.6-ESV before 9.6-ESV-R7-P2, when DNSSEC validation is enabled, does not properly initialize the failing-query cache, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) by sending many queries.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
isc | bind | 9.4 | |
isc | bind | 9.4.0 | |
isc | bind | 9.4.0 | |
isc | bind | 9.4.1 | |
isc | bind | 9.4.2 | |
isc | bind | 9.4.3 | |
isc | bind | 9.4.3 | |
isc | bind | 9.5 | |
isc | bind | 9.5.0 | |
isc | bind | 9.5.0 | |
isc | bind | 9.5.1 | |
isc | bind | 9.5.1 | |
isc | bind | 9.5.1 | |
isc | bind | 9.5.2 | |
isc | bind | 9.5.2 | |
isc | bind | 9.5.3 | |
isc | bind | 9.5.3 | |
isc | bind | 9.6.0 | |
isc | bind | 9.6.0 | |
isc | bind | 9.6.0 | |
isc | bind | 9.6.0 | |
isc | bind | 9.6.1 | |
isc | bind | 9.6.1 | |
isc | bind | 9.6.1 | |
isc | bind | 9.6.1 | |
isc | bind | 9.6.1 | |
isc | bind | 9.6.2 | |
isc | bind | 9.6.2 | |
isc | bind | 9.6.3 | |
isc | bind | 9.6.3 | |
isc | bind | 9.7.0 | |
isc | bind | 9.7.0 | |
isc | bind | 9.7.0 | |
isc | bind | 9.7.0 | |
isc | bind | 9.7.0 | |
isc | bind | 9.7.1 | |
isc | bind | 9.7.1 | |
isc | bind | 9.7.1 | |
isc | bind | 9.7.1 | |
isc | bind | 9.7.2 | |
isc | bind | 9.7.2 | |
isc | bind | 9.7.2 | |
isc | bind | 9.7.2 | |
isc | bind | 9.7.2 | |
isc | bind | 9.7.3 | |
isc | bind | 9.7.3 | |
isc | bind | 9.7.3 | |
isc | bind | 9.7.3 | |
isc | bind | 9.7.4 | |
isc | bind | 9.7.4 | |
isc | bind | 9.7.4 | |
isc | bind | 9.7.4 | |
isc | bind | 9.7.5 | |
isc | bind | 9.7.5 | |
isc | bind | 9.7.5 | |
isc | bind | 9.7.5 | |
isc | bind | 9.7.6 | |
isc | bind | 9.7.6 | |
isc | bind | 9.8.0 | |
isc | bind | 9.8.0 | |
isc | bind | 9.8.0 | |
isc | bind | 9.8.0 | |
isc | bind | 9.8.0 | |
isc | bind | 9.8.0 | |
isc | bind | 9.8.0 | |
isc | bind | 9.8.1 | |
isc | bind | 9.8.1 | |
isc | bind | 9.8.1 | |
isc | bind | 9.8.1 | |
isc | bind | 9.8.1 | |
isc | bind | 9.8.1 | |
isc | bind | 9.8.2 | |
isc | bind | 9.8.2 | |
isc | bind | 9.8.2 | |
isc | bind | 9.8.3 | |
isc | bind | 9.8.3 | |
isc | bind | 9.9.0 | |
isc | bind | 9.9.0 | |
isc | bind | 9.9.0 | |
isc | bind | 9.9.0 | |
isc | bind | 9.9.0 | |
isc | bind | 9.9.0 | |
isc | bind | 9.9.0 | |
isc | bind | 9.9.0 | |
isc | bind | 9.9.0 | |
isc | bind | 9.9.0 | |
isc | bind | 9.9.1 | |
isc | bind | 9.9.1 | |
isc | bind | 9.6 | |
isc | bind | 9.6 | |
isc | bind | 9.6 | |
isc | bind | 9.6 | |
isc | bind | 9.6 | |
isc | bind | 9.6 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:isc:bind:9.4:*:*:*:*:*:*:*", "matchCriteriaId": "5C8B18D7-4D15-46A7-8013-E6267127A427", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "6D7C7524-6943-4D94-8835-0221F0F0CD63", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.4.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "8F0AA9D0-9657-4E18-BF8B-45284C2D40A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "916D4013-27A5-4688-A985-A9B77F90AC45", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "F8583B8D-54A4-4064-810B-34F4F5A33A36", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "E01A12DF-E94B-426E-8751-96FC56105D5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.4.3:rc1:*:*:*:*:*:*", "matchCriteriaId": "19ADAB10-BDD0-409E-93C2-9E7223464131", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:isc:bind:9.5:*:*:*:*:*:*:*", "matchCriteriaId": "9A944178-032B-4637-842D-BC6B227043A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "32CEF8AD-9EE7-4ADA-888E-883751962529", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.5.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "90EE9C4A-F014-4ABA-9C4C-5D9561DD0A47", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "3F592D0F-095C-4F3B-97E7-E92C259D0CD9", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.5.1:rc1:*:*:*:*:*:*", "matchCriteriaId": "C55EC1E1-4D79-4357-94CB-7E152DFDE8DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.5.1:rc2:*:*:*:*:*:*", "matchCriteriaId": "83205FA5-56A2-4BBD-9278-2844704BAB07", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "F4449E90-2112-4860-A981-66639B9318ED", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.5.2:rc1:*:*:*:*:*:*", "matchCriteriaId": "A49A7D91-73BC-4894-A548-C46691AA66AF", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "5B9707CD-5410-4254-B44C-A0B80D4FDCB5", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.5.3:rc1:*:*:*:*:*:*", "matchCriteriaId": "0374932B-AE66-42C1-9797-380E8B73155E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:isc:bind:9.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "F42F7AF7-D37C-4213-B2BC-D2B9FE725BDE", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.6.0:p1:*:*:*:*:*:*", "matchCriteriaId": "5ABB3FC8-0A0D-4881-9137-5F6A8CCB9345", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.6.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "C02A3BC0-78A4-4F4D-AA5B-3C05122137EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.6.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "178C7D9F-8699-42A3-8729-0BC6323EBDF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "1BEF53C6-E555-49D4-B4B2-63BA71CC77E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.6.1:p1:*:*:*:*:*:*", "matchCriteriaId": "3C09FA4C-B094-4BAC-A194-ACC28F80AF69", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.6.1:p2:*:*:*:*:*:*", "matchCriteriaId": "6711B30D-4B57-4DDF-BC1E-98736B23E763", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.6.1:p3:*:*:*:*:*:*", "matchCriteriaId": "C9BE0418-4892-4304-B452-45F53DD961B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.6.1:rc1:*:*:*:*:*:*", "matchCriteriaId": "EEC21220-4207-4FE4-A7A9-9B223301B98D", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "4EC25639-482D-4574-B43B-497DDD8998B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.6.2:rc1:*:*:*:*:*:*", "matchCriteriaId": "600A9F11-70D9-4198-AD3D-7122EB352E49", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "6BCD66DB-383B-4BB7-8C00-E073C4F788F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.6.3:rc1:*:*:*:*:*:*", "matchCriteriaId": "9FE8C5A9-4312-4E4F-8734-20E5453094D1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:isc:bind:9.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "5B178BB5-A0DC-4014-A8CC-D89B0E2F9789", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.7.0:p1:*:*:*:*:*:*", "matchCriteriaId": "5B5F1155-78D6-480B-BC0A-1D36B08D2594", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.7.0:p2:*:*:*:*:*:*", "matchCriteriaId": "A11247D0-A33E-4CE5-910A-F38B89C63EC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.7.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "E9478F4E-451D-4B4E-8054-E09522F97C59", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.7.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "87393BF8-9FE3-4501-94CA-A1AA9E38E771", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "2FC642B5-ACA4-4764-A9F2-3C87D5D8E9E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.7.1:p1:*:*:*:*:*:*", "matchCriteriaId": "A16CE093-38E0-4274-AD53-B807DE72AF91", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.7.1:p2:*:*:*:*:*:*", "matchCriteriaId": "2FB97DEB-A0A4-458C-A94B-46B7264AB0F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.7.1:rc1:*:*:*:*:*:*", "matchCriteriaId": "BFDF6597-7131-4080-BCFC-46032138646C", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "881B8C5B-8A66-45AC-85E6-758B8A8153BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.7.2:p1:*:*:*:*:*:*", "matchCriteriaId": "4E2D144E-6A15-4B45-8B15-15B60FB33D71", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.7.2:p2:*:*:*:*:*:*", "matchCriteriaId": "B5690EC8-66C9-4316-BEAB-C218843F7FCC", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.7.2:p3:*:*:*:*:*:*", "matchCriteriaId": "FBF13572-C341-4FB1-BAFD-AF8F0C5EF510", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.7.2:rc1:*:*:*:*:*:*", "matchCriteriaId": "0B1D9F9C-54C2-485F-9B66-4AEA0573BC2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "423211E8-A08B-4254-977A-1917AED9B794", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.7.3:b1:*:*:*:*:*:*", "matchCriteriaId": "3ABE2712-33E9-45EE-890C-E9FC51D19B75", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.7.3:p1:*:*:*:*:*:*", "matchCriteriaId": "BD79961B-508F-4A20-AD4D-D766DFB928E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.7.3:rc1:*:*:*:*:*:*", "matchCriteriaId": "5E5510BF-3D22-49DA-A4C6-2D6204EB37C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.7.4:*:*:*:*:*:*:*", "matchCriteriaId": "AD1BC4C7-F72B-43DB-B729-018360F4B281", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.7.4:b1:*:*:*:*:*:*", "matchCriteriaId": "DB36BD1D-A6AB-4BC8-94C0-FA662622FF26", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.7.4:p1:*:*:*:*:*:*", "matchCriteriaId": "DFF83126-E2C8-4156-9C28-7E3005A74E17", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.7.4:rc1:*:*:*:*:*:*", "matchCriteriaId": "97D011B3-D9F3-4BC2-9695-A842148EA6BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.7.5:*:*:*:*:*:*:*", "matchCriteriaId": "8BC43BF9-5C34-4DF1-846A-E416DE9C7DA8", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.7.5:b1:*:*:*:*:*:*", "matchCriteriaId": "ADD24439-71B4-41AC-85D4-56511445051C", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.7.5:rc1:*:*:*:*:*:*", "matchCriteriaId": "B063AE57-D426-4565-B2D9-ACDB0C16C78E", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.7.5:rc2:*:*:*:*:*:*", "matchCriteriaId": "CCEA5F9A-A308-4573-BBEB-6B210A61D943", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.7.6:*:*:*:*:*:*:*", "matchCriteriaId": "D13D4E84-04EB-4843-A1C4-E3265D1DAC00", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.7.6:p1:*:*:*:*:*:*", "matchCriteriaId": "434AA05B-1A22-474B-BEA3-CACAD78955F4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:isc:bind:9.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "4EBDD71E-6F17-4EB6-899F-E27A93CDFDF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.8.0:a1:*:*:*:*:*:*", "matchCriteriaId": "811D03B2-96A8-47F9-80BE-54228A4108EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.8.0:b1:*:*:*:*:*:*", "matchCriteriaId": "B3D4393C-1151-49F9-963B-B6FD88E93814", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.8.0:p1:*:*:*:*:*:*", "matchCriteriaId": "25855A5C-302F-4A82-AEC1-8C4C9CB70362", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.8.0:p2:*:*:*:*:*:*", "matchCriteriaId": "03E68ACA-0288-4EE5-9250-54711B2E6670", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.8.0:p4:*:*:*:*:*:*", "matchCriteriaId": "8D717D3D-F4BF-470B-AC2B-D1234A7303EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.8.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "66D259B7-4F9E-43B2-BB1D-3B097D3CDB28", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "4F9DA20E-57EA-49A0-9DB2-E9E0191EC1AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.8.1:b1:*:*:*:*:*:*", "matchCriteriaId": "FCC604FD-A834-4BA7-B1E2-1FCB6A583204", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.8.1:b2:*:*:*:*:*:*", "matchCriteriaId": "479D3C6C-1FD7-4DBE-A841-4B58400A89F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.8.1:b3:*:*:*:*:*:*", "matchCriteriaId": "BAF29160-63C2-40D0-BE08-3C8181CD5092", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.8.1:p1:*:*:*:*:*:*", "matchCriteriaId": "8DAA3942-0979-4D33-BD52-EF7F0403DFBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.8.1:rc1:*:*:*:*:*:*", "matchCriteriaId": "39D75F93-B6A7-4D25-8147-25F7F867E5B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.8.2:b1:*:*:*:*:*:*", "matchCriteriaId": "B046CE1D-03E1-462F-9762-9269E59BD554", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.8.2:rc1:*:*:*:*:*:*", "matchCriteriaId": "DAC9049D-6284-40F7-9E97-596FEDF9EEDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.8.2:rc2:*:*:*:*:*:*", "matchCriteriaId": "10D06B47-911B-4095-ABD2-DDD38E6306F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "59428551-218B-4C32-982F-DCDC894E2954", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.8.3:p1:*:*:*:*:*:*", "matchCriteriaId": "961E22DC-1467-4A0C-9450-A2E047FCFCFD", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:isc:bind:9.9.0:*:*:*:*:*:*:*", "matchCriteriaId": "A2B96B87-F18C-41EF-9A37-7D0842433A4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.9.0:a1:*:*:*:*:*:*", "matchCriteriaId": "AFA1AA14-4D4A-45D0-9573-D53C0FFFFF78", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.9.0:a2:*:*:*:*:*:*", "matchCriteriaId": "F5DE1274-F7A1-4F12-A4F5-1CB1DD5B84E1", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.9.0:a3:*:*:*:*:*:*", "matchCriteriaId": "401A7E61-AC3D-417D-97B8-E5E736DC6FCC", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.9.0:b1:*:*:*:*:*:*", "matchCriteriaId": "C7C37F7D-DD28-4C70-A534-A3F434DF4273", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.9.0:b2:*:*:*:*:*:*", "matchCriteriaId": "B2EC1F99-85C1-4081-A118-790111741246", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.9.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "85D6C9B7-9D5D-4589-AC83-E6ECB535EBFD", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.9.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "043A5E3F-529B-4A9A-8531-184EE6D1942D", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.9.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "673057D5-256C-4933-B56F-4BF8848323F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.9.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "C2CE371B-E399-4D74-B46C-3606E4BDA53A", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "6A3798A1-134C-4066-A012-10C15F103EAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.9.1:p1:*:*:*:*:*:*", "matchCriteriaId": "9CA1AEBE-040C-483A-9850-7DA888FF8075", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:isc:bind:9.6:*:*:*:*:*:*:*", "matchCriteriaId": "20B4B4DA-5780-4D04-8A2B-371C06A470CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.6:r5_p1:*:*:*:*:*:*", "matchCriteriaId": "9672E9A0-C7F1-48DE-AE5B-977DFD614E61", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.6:r6_b1:*:*:*:*:*:*", "matchCriteriaId": "11FBC346-F6B6-40D6-8DA2-345BF20B450C", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.6:r6_rc1:*:*:*:*:*:*", "matchCriteriaId": "5272F28D-4257-4116-8C66-98EF875BEE63", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.6:r6_rc2:*:*:*:*:*:*", "matchCriteriaId": "E6BF457D-BDF9-4C0D-98B8-B8AB677BFB33", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.6:r7_p1:*:*:*:*:*:*", "matchCriteriaId": "4A9A0380-C0A1-4957-A199-3165F691F0A0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "ISC BIND 9.4.x, 9.5.x, 9.6.x, and 9.7.x before 9.7.6-P2; 9.8.x before 9.8.3-P2; 9.9.x before 9.9.1-P2; and 9.6-ESV before 9.6-ESV-R7-P2, when DNSSEC validation is enabled, does not properly initialize the failing-query cache, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) by sending many queries." }, { "lang": "es", "value": "ISC BIND v9.4.x, v9.5.x, v9.6.x, v9.7.x, y antes de v9.7.6-P2; v9.8.x antes de v9.8.3-P2; v9.9.x antes de v9.9.1-P2, y v9.6-ESV antes v9.6-ESV-vR7-P2, cuando est\u00e1 habilitada la validaci\u00f3n DNSSEC, no inicializar correctamente la cach\u00e9 no-query, que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (error de aserci\u00f3n y salida demonio) mediante el env\u00edo de muchas consultas." } ], "id": "CVE-2012-3817", "lastModified": "2024-11-21T01:41:40.823", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-07-25T10:42:35.803", "references": [ { "source": "cve@mitre.org", "url": "http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00013.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00015.html" }, { "source": "cve@mitre.org", "url": "http://rhn.redhat.com/errata/RHSA-2012-1122.html" }, { "source": "cve@mitre.org", "url": "http://rhn.redhat.com/errata/RHSA-2012-1123.html" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/51096" }, { "source": "cve@mitre.org", "url": "http://support.apple.com/kb/HT5880" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2012/dsa-2517" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1027296" }, { "source": "cve@mitre.org", "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2012\u0026m=slackware-security.536004" }, { "source": "cve@mitre.org", "url": "http://www.ubuntu.com/usn/USN-1518-1" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://kb.isc.org/article/AA-00729" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00013.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00015.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2012-1122.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2012-1123.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/51096" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://support.apple.com/kb/HT5880" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2012/dsa-2517" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1027296" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2012\u0026m=slackware-security.536004" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-1518-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://kb.isc.org/article/AA-00729" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.