Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2012-1667

Опубликовано: 05 июн. 2012
Источник: ubuntu
Приоритет: medium
EPSS Средний
CVSS2: 8.5

Описание

ISC BIND 9.x before 9.7.6-P1, 9.8.x before 9.8.3-P1, 9.9.x before 9.9.1-P1, and 9.4-ESV and 9.6-ESV before 9.6-ESV-R7-P1 does not properly handle resource records with a zero-length RDATA section, which allows remote DNS servers to cause a denial of service (daemon crash or data corruption) or obtain sensitive information from process memory via a crafted record.

РелизСтатусПримечание
devel

released

1:9.8.1.dfsg.P1-4ubuntu1
hardy

released

1:9.4.2.dfsg.P2-2ubuntu0.10
lucid

released

1:9.7.0.dfsg.P1-1ubuntu0.5
natty

released

1:9.7.3.dfsg-1ubuntu2.4
oneiric

released

1:9.7.3.dfsg-1ubuntu4.2
precise

released

1:9.8.1.dfsg.P1-4ubuntu0.1
upstream

released

9.6-ESV-R7-P1, 9.7.6-P1, 9.8.3-P1

Показывать по

EPSS

Процентиль: 97%
0.39738
Средний

8.5 High

CVSS2

Связанные уязвимости

redhat
около 13 лет назад

ISC BIND 9.x before 9.7.6-P1, 9.8.x before 9.8.3-P1, 9.9.x before 9.9.1-P1, and 9.4-ESV and 9.6-ESV before 9.6-ESV-R7-P1 does not properly handle resource records with a zero-length RDATA section, which allows remote DNS servers to cause a denial of service (daemon crash or data corruption) or obtain sensitive information from process memory via a crafted record.

nvd
около 13 лет назад

ISC BIND 9.x before 9.7.6-P1, 9.8.x before 9.8.3-P1, 9.9.x before 9.9.1-P1, and 9.4-ESV and 9.6-ESV before 9.6-ESV-R7-P1 does not properly handle resource records with a zero-length RDATA section, which allows remote DNS servers to cause a denial of service (daemon crash or data corruption) or obtain sensitive information from process memory via a crafted record.

debian
около 13 лет назад

ISC BIND 9.x before 9.7.6-P1, 9.8.x before 9.8.3-P1, 9.9.x before 9.9. ...

github
больше 3 лет назад

ISC BIND 9.x before 9.7.6-P1, 9.8.x before 9.8.3-P1, 9.9.x before 9.9.1-P1, and 9.4-ESV and 9.6-ESV before 9.6-ESV-R7-P1 does not properly handle resource records with a zero-length RDATA section, which allows remote DNS servers to cause a denial of service (daemon crash or data corruption) or obtain sensitive information from process memory via a crafted record.

oracle-oval
около 13 лет назад

ELSA-2012-0717: bind97 security update (IMPORTANT)

EPSS

Процентиль: 97%
0.39738
Средний

8.5 High

CVSS2