Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2013-4854

Опубликовано: 29 июл. 2013
Источник: ubuntu
Приоритет: high
EPSS Высокий
CVSS2: 7.8

Описание

The RFC 5011 implementation in rdata.c in ISC BIND 9.7.x and 9.8.x before 9.8.5-P2, 9.8.6b1, 9.9.x before 9.9.3-P2, and 9.9.4b1, and DNSco BIND 9.9.3-S1 before 9.9.3-S1-P1 and 9.9.4-S1b1, allows remote attackers to cause a denial of service (assertion failure and named daemon exit) via a query with a malformed RDATA section that is not properly handled during construction of a log message, as exploited in the wild in July 2013.

РелизСтатусПримечание
devel

released

1:9.9.2.dfsg.P1-2ubuntu3
lucid

released

1:9.7.0.dfsg.P1-1ubuntu0.10
precise

released

1:9.8.1.dfsg.P1-4ubuntu0.7
quantal

released

1:9.8.1.dfsg.P1-4.2ubuntu3.3
raring

released

1:9.9.2.dfsg.P1-2ubuntu2.1
upstream

released

9.8.5-P2, 9.9.3-P2, 9.9.3-S1-P1

Показывать по

EPSS

Процентиль: 99%
0.70184
Высокий

7.8 High

CVSS2

Связанные уязвимости

redhat
около 12 лет назад

The RFC 5011 implementation in rdata.c in ISC BIND 9.7.x and 9.8.x before 9.8.5-P2, 9.8.6b1, 9.9.x before 9.9.3-P2, and 9.9.4b1, and DNSco BIND 9.9.3-S1 before 9.9.3-S1-P1 and 9.9.4-S1b1, allows remote attackers to cause a denial of service (assertion failure and named daemon exit) via a query with a malformed RDATA section that is not properly handled during construction of a log message, as exploited in the wild in July 2013.

nvd
около 12 лет назад

The RFC 5011 implementation in rdata.c in ISC BIND 9.7.x and 9.8.x before 9.8.5-P2, 9.8.6b1, 9.9.x before 9.9.3-P2, and 9.9.4b1, and DNSco BIND 9.9.3-S1 before 9.9.3-S1-P1 and 9.9.4-S1b1, allows remote attackers to cause a denial of service (assertion failure and named daemon exit) via a query with a malformed RDATA section that is not properly handled during construction of a log message, as exploited in the wild in July 2013.

debian
около 12 лет назад

The RFC 5011 implementation in rdata.c in ISC BIND 9.7.x and 9.8.x bef ...

github
больше 3 лет назад

The RFC 5011 implementation in rdata.c in ISC BIND 9.7.x and 9.8.x before 9.8.5-P2, 9.8.6b1, 9.9.x before 9.9.3-P2, and 9.9.4b1, and DNSco BIND 9.9.3-S1 before 9.9.3-S1-P1 and 9.9.4-S1b1, allows remote attackers to cause a denial of service (assertion failure and named daemon exit) via a query with a malformed RDATA section that is not properly handled during construction of a log message, as exploited in the wild in July 2013.

oracle-oval
около 12 лет назад

ELSA-2013-1115: bind97 security update (IMPORTANT)

EPSS

Процентиль: 99%
0.70184
Высокий

7.8 High

CVSS2