Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2014-3859

Опубликовано: 13 июн. 2014
Источник: debian
EPSS Средний

Описание

libdns in ISC BIND 9.10.0 before P2 does not properly handle EDNS options, which allows remote attackers to cause a denial of service (REQUIRE assertion failure and daemon exit) via a crafted packet, as demonstrated by an attack against named, dig, or delv.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
bind9not-affectedpackage

Примечания

  • https://kb.isc.org/article/AA-01166

EPSS

Процентиль: 96%
0.29819
Средний

Связанные уязвимости

ubuntu
около 11 лет назад

libdns in ISC BIND 9.10.0 before P2 does not properly handle EDNS options, which allows remote attackers to cause a denial of service (REQUIRE assertion failure and daemon exit) via a crafted packet, as demonstrated by an attack against named, dig, or delv.

redhat
около 11 лет назад

libdns in ISC BIND 9.10.0 before P2 does not properly handle EDNS options, which allows remote attackers to cause a denial of service (REQUIRE assertion failure and daemon exit) via a crafted packet, as demonstrated by an attack against named, dig, or delv.

nvd
около 11 лет назад

libdns in ISC BIND 9.10.0 before P2 does not properly handle EDNS options, which allows remote attackers to cause a denial of service (REQUIRE assertion failure and daemon exit) via a crafted packet, as demonstrated by an attack against named, dig, or delv.

github
около 3 лет назад

libdns in ISC BIND 9.10.0 before P2 does not properly handle EDNS options, which allows remote attackers to cause a denial of service (REQUIRE assertion failure and daemon exit) via a crafted packet, as demonstrated by an attack against named, dig, or delv.

fstec
около 11 лет назад

Уязвимость программного обеспечения BIND Server, позволяющая удаленному злоумышленнику нарушить доступность защищаемой информации

EPSS

Процентиль: 96%
0.29819
Средний