fkie_cve-2013-6230
Vulnerability from fkie_nvd
Published
2013-11-08 04:47
Modified
2024-11-21 01:58
Severity ?
Summary
The Winsock WSAIoctl API in Microsoft Windows Server 2008, as used in ISC BIND 9.6-ESV before 9.6-ESV-R10-P1, 9.8 before 9.8.6-P1, 9.9 before 9.9.4-P1, 9.9.3-S1, 9.9.4-S1, and other products, does not properly support the SIO_GET_INTERFACE_LIST command for netmask 255.255.255.255, which allows remote attackers to bypass intended IP address restrictions by leveraging misinterpretation of this netmask as a 0.0.0.0 netmask.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
isc | bind | 9.6 | |
isc | bind | 9.6 | |
isc | bind | 9.6 | |
isc | bind | 9.6 | |
isc | bind | 9.6 | |
isc | bind | 9.6 | |
isc | bind | 9.6 | |
isc | bind | 9.6 | |
isc | bind | 9.8.0 | |
isc | bind | 9.8.0 | |
isc | bind | 9.8.0 | |
isc | bind | 9.8.0 | |
isc | bind | 9.8.0 | |
isc | bind | 9.8.0 | |
isc | bind | 9.8.0 | |
isc | bind | 9.8.1 | |
isc | bind | 9.8.1 | |
isc | bind | 9.8.1 | |
isc | bind | 9.8.1 | |
isc | bind | 9.8.1 | |
isc | bind | 9.8.1 | |
isc | bind | 9.8.2 | |
isc | bind | 9.8.2 | |
isc | bind | 9.8.2 | |
isc | bind | 9.8.3 | |
isc | bind | 9.8.3 | |
isc | bind | 9.8.3 | |
isc | bind | 9.8.4 | |
isc | bind | 9.8.5 | |
isc | bind | 9.8.5 | |
isc | bind | 9.8.5 | |
isc | bind | 9.8.5 | |
isc | bind | 9.8.5 | |
isc | bind | 9.8.5 | |
isc | bind | 9.8.5 | |
isc | bind | 9.8.6 | |
isc | bind | 9.9.0 | |
isc | bind | 9.9.0 | |
isc | bind | 9.9.0 | |
isc | bind | 9.9.0 | |
isc | bind | 9.9.0 | |
isc | bind | 9.9.0 | |
isc | bind | 9.9.0 | |
isc | bind | 9.9.0 | |
isc | bind | 9.9.0 | |
isc | bind | 9.9.0 | |
isc | bind | 9.9.1 | |
isc | bind | 9.9.1 | |
isc | bind | 9.9.1 | |
isc | bind | 9.9.2 | |
isc | bind | 9.9.3 | |
isc | bind | 9.9.3 | |
isc | bind | 9.9.3 | |
isc | bind | 9.9.3 | |
isc | bind | 9.9.3 | |
isc | bind | 9.9.3 | |
isc | bind | 9.9.3 | |
isc | bind | 9.9.4 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:isc:bind:9.6:*:*:*:*:*:*:*", "matchCriteriaId": "20B4B4DA-5780-4D04-8A2B-371C06A470CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.6:r5_p1:*:*:*:*:*:*", "matchCriteriaId": "9672E9A0-C7F1-48DE-AE5B-977DFD614E61", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.6:r6_b1:*:*:*:*:*:*", "matchCriteriaId": "11FBC346-F6B6-40D6-8DA2-345BF20B450C", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.6:r6_rc1:*:*:*:*:*:*", "matchCriteriaId": "5272F28D-4257-4116-8C66-98EF875BEE63", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.6:r6_rc2:*:*:*:*:*:*", "matchCriteriaId": "E6BF457D-BDF9-4C0D-98B8-B8AB677BFB33", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.6:r7_p1:*:*:*:*:*:*", "matchCriteriaId": "4A9A0380-C0A1-4957-A199-3165F691F0A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.6:r7_p2:*:*:*:*:*:*", "matchCriteriaId": "51913202-006F-4A5B-AAF0-637AAFA8CE43", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.6:r9_p1:*:*:*:*:*:*", "matchCriteriaId": "F0021DD3-C9DD-462E-9734-11E3C78EAB4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "4EBDD71E-6F17-4EB6-899F-E27A93CDFDF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.8.0:a1:*:*:*:*:*:*", "matchCriteriaId": "811D03B2-96A8-47F9-80BE-54228A4108EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.8.0:b1:*:*:*:*:*:*", "matchCriteriaId": "B3D4393C-1151-49F9-963B-B6FD88E93814", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.8.0:p1:*:*:*:*:*:*", "matchCriteriaId": "25855A5C-302F-4A82-AEC1-8C4C9CB70362", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.8.0:p2:*:*:*:*:*:*", "matchCriteriaId": "03E68ACA-0288-4EE5-9250-54711B2E6670", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.8.0:p4:*:*:*:*:*:*", "matchCriteriaId": "8D717D3D-F4BF-470B-AC2B-D1234A7303EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.8.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "66D259B7-4F9E-43B2-BB1D-3B097D3CDB28", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "4F9DA20E-57EA-49A0-9DB2-E9E0191EC1AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.8.1:b1:*:*:*:*:*:*", "matchCriteriaId": "FCC604FD-A834-4BA7-B1E2-1FCB6A583204", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.8.1:b2:*:*:*:*:*:*", "matchCriteriaId": "479D3C6C-1FD7-4DBE-A841-4B58400A89F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.8.1:b3:*:*:*:*:*:*", "matchCriteriaId": "BAF29160-63C2-40D0-BE08-3C8181CD5092", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.8.1:p1:*:*:*:*:*:*", "matchCriteriaId": "8DAA3942-0979-4D33-BD52-EF7F0403DFBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.8.1:rc1:*:*:*:*:*:*", "matchCriteriaId": "39D75F93-B6A7-4D25-8147-25F7F867E5B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.8.2:b1:*:*:*:*:*:*", "matchCriteriaId": "B046CE1D-03E1-462F-9762-9269E59BD554", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.8.2:rc1:*:*:*:*:*:*", "matchCriteriaId": "DAC9049D-6284-40F7-9E97-596FEDF9EEDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.8.2:rc2:*:*:*:*:*:*", "matchCriteriaId": "10D06B47-911B-4095-ABD2-DDD38E6306F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "59428551-218B-4C32-982F-DCDC894E2954", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.8.3:p1:*:*:*:*:*:*", "matchCriteriaId": "961E22DC-1467-4A0C-9450-A2E047FCFCFD", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.8.3:p2:*:*:*:*:*:*", "matchCriteriaId": "DF77CAF5-A8D6-4479-9C4D-A698D26BDC6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "AD318FF1-320B-4311-AF7E-988C023B4938", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.8.5:*:*:*:*:*:*:*", "matchCriteriaId": "BDCC8861-0655-4180-A083-1516AC441A3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.8.5:b1:*:*:*:*:*:*", "matchCriteriaId": "DB2E6ABE-B1CB-4603-AFC8-BB7BE1AD96B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.8.5:b2:*:*:*:*:*:*", "matchCriteriaId": "C8FC8393-5812-4032-A458-80C01248B18D", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.8.5:p1:*:*:*:*:*:*", "matchCriteriaId": "8DEC5C59-44A6-4B48-A84F-22C080CBE5CD", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.8.5:p2:*:*:*:*:*:*", "matchCriteriaId": "99AB2851-72D9-4B8D-8BB0-DD6E1909943B", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.8.5:rc1:*:*:*:*:*:*", "matchCriteriaId": "87BAA6BD-4677-451B-B012-F3FF6C95B369", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.8.5:rc2:*:*:*:*:*:*", "matchCriteriaId": "0E52B0E7-9392-4B08-906F-C47C5CA41044", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.8.6:b1:*:*:*:*:*:*", "matchCriteriaId": "BD8E5645-EAE9-43A5-8845-229C403BF93B", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.9.0:*:*:*:*:*:*:*", "matchCriteriaId": "A2B96B87-F18C-41EF-9A37-7D0842433A4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.9.0:a1:*:*:*:*:*:*", "matchCriteriaId": "AFA1AA14-4D4A-45D0-9573-D53C0FFFFF78", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.9.0:a2:*:*:*:*:*:*", "matchCriteriaId": "F5DE1274-F7A1-4F12-A4F5-1CB1DD5B84E1", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.9.0:a3:*:*:*:*:*:*", "matchCriteriaId": "401A7E61-AC3D-417D-97B8-E5E736DC6FCC", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.9.0:b1:*:*:*:*:*:*", "matchCriteriaId": "C7C37F7D-DD28-4C70-A534-A3F434DF4273", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.9.0:b2:*:*:*:*:*:*", "matchCriteriaId": "B2EC1F99-85C1-4081-A118-790111741246", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.9.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "85D6C9B7-9D5D-4589-AC83-E6ECB535EBFD", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.9.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "043A5E3F-529B-4A9A-8531-184EE6D1942D", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.9.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "673057D5-256C-4933-B56F-4BF8848323F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.9.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "C2CE371B-E399-4D74-B46C-3606E4BDA53A", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "6A3798A1-134C-4066-A012-10C15F103EAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.9.1:p1:*:*:*:*:*:*", "matchCriteriaId": "9CA1AEBE-040C-483A-9850-7DA888FF8075", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.9.1:p2:*:*:*:*:*:*", "matchCriteriaId": "B9A33F04-3240-4268-B613-C4876770A30F", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "91DA33F1-CA29-4EB1-8F95-8CEA71383BF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "2A7BE793-7717-4019-8F50-158C309E48B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.9.3:b1:*:*:*:*:*:*", "matchCriteriaId": "9BE322FB-CC6F-46BA-861C-74C16D7FC791", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.9.3:b2:*:*:*:*:*:*", "matchCriteriaId": "9C322F95-B13A-4495-A87E-9295C0169DE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.9.3:p1:*:*:*:*:*:*", "matchCriteriaId": "C267AE8E-A71A-4AE4-BF93-86C43924E477", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.9.3:p2:*:*:*:*:*:*", "matchCriteriaId": "71A49952-108B-410C-BBFD-3DCEF5E2C00B", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.9.3:rc1:*:*:*:*:*:*", "matchCriteriaId": "38A3F698-5E6C-40AC-9DC6-FF7478E0440C", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.9.3:rc2:*:*:*:*:*:*", "matchCriteriaId": "C7E1293E-82F4-4401-B3AA-7CB73761E163", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:9.9.4:b1:*:*:*:*:*:*", "matchCriteriaId": "D6A3B397-2FC9-4584-AD1A-ED241716B0FB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Winsock WSAIoctl API in Microsoft Windows Server 2008, as used in ISC BIND 9.6-ESV before 9.6-ESV-R10-P1, 9.8 before 9.8.6-P1, 9.9 before 9.9.4-P1, 9.9.3-S1, 9.9.4-S1, and other products, does not properly support the SIO_GET_INTERFACE_LIST command for netmask 255.255.255.255, which allows remote attackers to bypass intended IP address restrictions by leveraging misinterpretation of this netmask as a 0.0.0.0 netmask." }, { "lang": "es", "value": "El API Winsock WSAloctl en Microsoft Windows Server 2008, utilizado en ISC BIND 9.6-ESV (anterior a 9.6-ESV-R10-P1), 9.8 (anterior a 9.8.6-P1), 9.9 (anterior a 9.9.4-P1, 9.9.3-S1, 9.9.4-S1), y otros productos, no soportan apropiadamente el comando SIO_GET_INTERFACE_LIST para la m\u00e1scara de red 255.255.255.255, lo que permite a atacantes remotos sorterar restricciones de direcci\u00f3n IP aprovechando la reinterpretaci\u00f3n de esta m\u00e1scara como 0.0.0.0" } ], "id": "CVE-2013-6230", "lastModified": "2024-11-21T01:58:53.317", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-11-08T04:47:23.087", "references": [ { "source": "cve@mitre.org", "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2014\u0026m=slackware-security.518391" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://kb.isc.org/article/AA-01062" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://kb.isc.org/article/AA-01063" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2014\u0026m=slackware-security.518391" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://kb.isc.org/article/AA-01062" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://kb.isc.org/article/AA-01063" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.