fkie_cve-2013-2266
Vulnerability from fkie_nvd
Published
2013-03-28 16:55
Modified
2024-11-21 01:51
Severity ?
Summary
libdns in ISC BIND 9.7.x and 9.8.x before 9.8.4-P2, 9.8.5 before 9.8.5b2, 9.9.x before 9.9.2-P2, and 9.9.3 before 9.9.3b2 on UNIX platforms allows remote attackers to cause a denial of service (memory consumption) via a crafted regular expression, as demonstrated by a memory-exhaustion attack against a machine running a named process.
References
cve@mitre.orghttp://linux.oracle.com/errata/ELSA-2014-1244
cve@mitre.orghttp://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html
cve@mitre.orghttp://lists.fedoraproject.org/pipermail/package-announce/2013-April/101500.html
cve@mitre.orghttp://lists.fedoraproject.org/pipermail/package-announce/2013-April/101603.html
cve@mitre.orghttp://marc.info/?l=bugtraq&m=136804614120794&w=2
cve@mitre.orghttp://marc.info/?l=bugtraq&m=136804614120794&w=2
cve@mitre.orghttp://rhn.redhat.com/errata/RHSA-2013-0689.html
cve@mitre.orghttp://rhn.redhat.com/errata/RHSA-2013-0690.html
cve@mitre.orghttp://support.apple.com/kb/HT5880
cve@mitre.orghttp://www.debian.org/security/2013/dsa-2656
cve@mitre.orghttp://www.isc.org/software/bind/advisories/cve-2013-2266Vendor Advisory
cve@mitre.orghttp://www.securityfocus.com/bid/58736
cve@mitre.orghttp://www.ubuntu.com/usn/USN-1783-1
cve@mitre.orghttps://kb.isc.org/article/AA-00871/
cve@mitre.orghttps://kb.isc.org/article/AA-00879/Vendor Advisory
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19579
af854a3a-2127-422b-91ae-364da2661108http://linux.oracle.com/errata/ELSA-2014-1244
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101500.html
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101603.html
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=136804614120794&w=2
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=136804614120794&w=2
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2013-0689.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2013-0690.html
af854a3a-2127-422b-91ae-364da2661108http://support.apple.com/kb/HT5880
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2013/dsa-2656
af854a3a-2127-422b-91ae-364da2661108http://www.isc.org/software/bind/advisories/cve-2013-2266Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/58736
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-1783-1
af854a3a-2127-422b-91ae-364da2661108https://kb.isc.org/article/AA-00871/
af854a3a-2127-422b-91ae-364da2661108https://kb.isc.org/article/AA-00879/Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19579
Impacted products
Vendor Product Version
isc bind 9.9.0
isc bind 9.9.0
isc bind 9.9.0
isc bind 9.9.0
isc bind 9.9.0
isc bind 9.9.0
isc bind 9.9.0
isc bind 9.9.0
isc bind 9.9.0
isc bind 9.9.0
isc bind 9.9.1
isc bind 9.9.1
isc bind 9.9.1
isc bind 9.9.2
isc bind 9.9.3
isc bind 9.9.3
isc bind 9.7.0
isc bind 9.7.0
isc bind 9.7.0
isc bind 9.7.0
isc bind 9.7.0
isc bind 9.7.0
isc bind 9.7.1
isc bind 9.7.1
isc bind 9.7.1
isc bind 9.7.1
isc bind 9.7.2
isc bind 9.7.2
isc bind 9.7.2
isc bind 9.7.2
isc bind 9.7.2
isc bind 9.7.3
isc bind 9.7.3
isc bind 9.7.3
isc bind 9.7.3
isc bind 9.7.4
isc bind 9.7.4
isc bind 9.7.4
isc bind 9.7.4
isc bind 9.7.5
isc bind 9.7.5
isc bind 9.7.5
isc bind 9.7.5
isc bind 9.7.6
isc bind 9.7.6
isc bind 9.7.6
isc bind 9.8.0
isc bind 9.8.0
isc bind 9.8.0
isc bind 9.8.0
isc bind 9.8.0
isc bind 9.8.0
isc bind 9.8.0
isc bind 9.8.1
isc bind 9.8.1
isc bind 9.8.1
isc bind 9.8.1
isc bind 9.8.1
isc bind 9.8.1
isc bind 9.8.2
isc bind 9.8.2
isc bind 9.8.2
isc bind 9.8.3
isc bind 9.8.3
isc bind 9.8.3
isc bind 9.8.4
isc bind 9.8.5
isc bind 9.8.5



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:isc:bind:9.9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2B96B87-F18C-41EF-9A37-7D0842433A4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.9.0:a1:*:*:*:*:*:*",
              "matchCriteriaId": "AFA1AA14-4D4A-45D0-9573-D53C0FFFFF78",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.9.0:a2:*:*:*:*:*:*",
              "matchCriteriaId": "F5DE1274-F7A1-4F12-A4F5-1CB1DD5B84E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.9.0:a3:*:*:*:*:*:*",
              "matchCriteriaId": "401A7E61-AC3D-417D-97B8-E5E736DC6FCC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.9.0:b1:*:*:*:*:*:*",
              "matchCriteriaId": "C7C37F7D-DD28-4C70-A534-A3F434DF4273",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.9.0:b2:*:*:*:*:*:*",
              "matchCriteriaId": "B2EC1F99-85C1-4081-A118-790111741246",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.9.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "85D6C9B7-9D5D-4589-AC83-E6ECB535EBFD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.9.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "043A5E3F-529B-4A9A-8531-184EE6D1942D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.9.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "673057D5-256C-4933-B56F-4BF8848323F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.9.0:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "C2CE371B-E399-4D74-B46C-3606E4BDA53A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A3798A1-134C-4066-A012-10C15F103EAC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.9.1:p1:*:*:*:*:*:*",
              "matchCriteriaId": "9CA1AEBE-040C-483A-9850-7DA888FF8075",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.9.1:p2:*:*:*:*:*:*",
              "matchCriteriaId": "B9A33F04-3240-4268-B613-C4876770A30F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.9.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "91DA33F1-CA29-4EB1-8F95-8CEA71383BF4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:isc:bind:9.9.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A7BE793-7717-4019-8F50-158C309E48B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.9.3:b1:*:*:*:*:*:*",
              "matchCriteriaId": "9BE322FB-CC6F-46BA-861C-74C16D7FC791",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:isc:bind:9.7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B178BB5-A0DC-4014-A8CC-D89B0E2F9789",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.7.0:b1:*:*:*:*:*:*",
              "matchCriteriaId": "1BE753CB-A16D-4605-8640-137CD4A2BB16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.7.0:p1:*:*:*:*:*:*",
              "matchCriteriaId": "5B5F1155-78D6-480B-BC0A-1D36B08D2594",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.7.0:p2:*:*:*:*:*:*",
              "matchCriteriaId": "A11247D0-A33E-4CE5-910A-F38B89C63EC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.7.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "E9478F4E-451D-4B4E-8054-E09522F97C59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.7.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "87393BF8-9FE3-4501-94CA-A1AA9E38E771",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FC642B5-ACA4-4764-A9F2-3C87D5D8E9E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.7.1:p1:*:*:*:*:*:*",
              "matchCriteriaId": "A16CE093-38E0-4274-AD53-B807DE72AF91",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.7.1:p2:*:*:*:*:*:*",
              "matchCriteriaId": "2FB97DEB-A0A4-458C-A94B-46B7264AB0F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.7.1:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "BFDF6597-7131-4080-BCFC-46032138646C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "881B8C5B-8A66-45AC-85E6-758B8A8153BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.7.2:p1:*:*:*:*:*:*",
              "matchCriteriaId": "4E2D144E-6A15-4B45-8B15-15B60FB33D71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.7.2:p2:*:*:*:*:*:*",
              "matchCriteriaId": "B5690EC8-66C9-4316-BEAB-C218843F7FCC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.7.2:p3:*:*:*:*:*:*",
              "matchCriteriaId": "FBF13572-C341-4FB1-BAFD-AF8F0C5EF510",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.7.2:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "0B1D9F9C-54C2-485F-9B66-4AEA0573BC2E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "423211E8-A08B-4254-977A-1917AED9B794",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.7.3:b1:*:*:*:*:*:*",
              "matchCriteriaId": "3ABE2712-33E9-45EE-890C-E9FC51D19B75",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.7.3:p1:*:*:*:*:*:*",
              "matchCriteriaId": "BD79961B-508F-4A20-AD4D-D766DFB928E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.7.3:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "5E5510BF-3D22-49DA-A4C6-2D6204EB37C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD1BC4C7-F72B-43DB-B729-018360F4B281",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.7.4:b1:*:*:*:*:*:*",
              "matchCriteriaId": "DB36BD1D-A6AB-4BC8-94C0-FA662622FF26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.7.4:p1:*:*:*:*:*:*",
              "matchCriteriaId": "DFF83126-E2C8-4156-9C28-7E3005A74E17",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.7.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "97D011B3-D9F3-4BC2-9695-A842148EA6BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.7.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BC43BF9-5C34-4DF1-846A-E416DE9C7DA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.7.5:b1:*:*:*:*:*:*",
              "matchCriteriaId": "ADD24439-71B4-41AC-85D4-56511445051C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.7.5:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B063AE57-D426-4565-B2D9-ACDB0C16C78E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.7.5:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "CCEA5F9A-A308-4573-BBEB-6B210A61D943",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "D13D4E84-04EB-4843-A1C4-E3265D1DAC00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.7.6:p1:*:*:*:*:*:*",
              "matchCriteriaId": "434AA05B-1A22-474B-BEA3-CACAD78955F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.7.6:p2:*:*:*:*:*:*",
              "matchCriteriaId": "E434E995-F554-45A7-A907-EE2725727B82",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:isc:bind:9.8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EBDD71E-6F17-4EB6-899F-E27A93CDFDF2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.8.0:a1:*:*:*:*:*:*",
              "matchCriteriaId": "811D03B2-96A8-47F9-80BE-54228A4108EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.8.0:b1:*:*:*:*:*:*",
              "matchCriteriaId": "B3D4393C-1151-49F9-963B-B6FD88E93814",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.8.0:p1:*:*:*:*:*:*",
              "matchCriteriaId": "25855A5C-302F-4A82-AEC1-8C4C9CB70362",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.8.0:p2:*:*:*:*:*:*",
              "matchCriteriaId": "03E68ACA-0288-4EE5-9250-54711B2E6670",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.8.0:p4:*:*:*:*:*:*",
              "matchCriteriaId": "8D717D3D-F4BF-470B-AC2B-D1234A7303EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.8.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "66D259B7-4F9E-43B2-BB1D-3B097D3CDB28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F9DA20E-57EA-49A0-9DB2-E9E0191EC1AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.8.1:b1:*:*:*:*:*:*",
              "matchCriteriaId": "FCC604FD-A834-4BA7-B1E2-1FCB6A583204",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.8.1:b2:*:*:*:*:*:*",
              "matchCriteriaId": "479D3C6C-1FD7-4DBE-A841-4B58400A89F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.8.1:b3:*:*:*:*:*:*",
              "matchCriteriaId": "BAF29160-63C2-40D0-BE08-3C8181CD5092",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.8.1:p1:*:*:*:*:*:*",
              "matchCriteriaId": "8DAA3942-0979-4D33-BD52-EF7F0403DFBD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.8.1:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "39D75F93-B6A7-4D25-8147-25F7F867E5B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.8.2:b1:*:*:*:*:*:*",
              "matchCriteriaId": "B046CE1D-03E1-462F-9762-9269E59BD554",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.8.2:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "DAC9049D-6284-40F7-9E97-596FEDF9EEDA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.8.2:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "10D06B47-911B-4095-ABD2-DDD38E6306F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.8.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "59428551-218B-4C32-982F-DCDC894E2954",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.8.3:p1:*:*:*:*:*:*",
              "matchCriteriaId": "961E22DC-1467-4A0C-9450-A2E047FCFCFD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.8.3:p2:*:*:*:*:*:*",
              "matchCriteriaId": "DF77CAF5-A8D6-4479-9C4D-A698D26BDC6A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.8.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD318FF1-320B-4311-AF7E-988C023B4938",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDCC8861-0655-4180-A083-1516AC441A3C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:isc:bind:9.8.5:b1:*:*:*:*:*:*",
              "matchCriteriaId": "DB2E6ABE-B1CB-4603-AFC8-BB7BE1AD96B5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "libdns in ISC BIND 9.7.x and 9.8.x before 9.8.4-P2, 9.8.5 before 9.8.5b2, 9.9.x before 9.9.2-P2, and 9.9.3 before 9.9.3b2 on UNIX platforms allows remote attackers to cause a denial of service (memory consumption) via a crafted regular expression, as demonstrated by a memory-exhaustion attack against a machine running a named process."
    },
    {
      "lang": "es",
      "value": "libdns en ISC BIND v9.7.x y v9.8.x antes v9.8.4-P2, v9.8.5 antes de v9.8.5b2, v9.9.x antes de v9.9.2-P2, y v9.9.3 antes v9.9.3b2 en plataformas UNIX permite a atacantes remotos para causar una denegaci\u00f3n de servicio (consumo de memoria) a trav\u00e9s de una expresi\u00f3n regular manipulada, como lo demuestra un ataque memoria de agotamiento contra un equipo que ejecuta un proceso llamado."
    }
  ],
  "id": "CVE-2013-2266",
  "lastModified": "2024-11-21T01:51:21.653",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.8,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2013-03-28T16:55:01.040",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://linux.oracle.com/errata/ELSA-2014-1244"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101500.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101603.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=136804614120794\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=136804614120794\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://rhn.redhat.com/errata/RHSA-2013-0689.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://rhn.redhat.com/errata/RHSA-2013-0690.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://support.apple.com/kb/HT5880"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2013/dsa-2656"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.isc.org/software/bind/advisories/cve-2013-2266"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/58736"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ubuntu.com/usn/USN-1783-1"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://kb.isc.org/article/AA-00871/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://kb.isc.org/article/AA-00879/"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19579"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://linux.oracle.com/errata/ELSA-2014-1244"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101500.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101603.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=136804614120794\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=136804614120794\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2013-0689.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2013-0690.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://support.apple.com/kb/HT5880"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2013/dsa-2656"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.isc.org/software/bind/advisories/cve-2013-2266"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/58736"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-1783-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://kb.isc.org/article/AA-00871/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://kb.isc.org/article/AA-00879/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19579"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.