Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2014-3859

Опубликовано: 13 июн. 2014
Источник: ubuntu
Приоритет: medium
EPSS Средний
CVSS2: 5

Описание

libdns in ISC BIND 9.10.0 before P2 does not properly handle EDNS options, which allows remote attackers to cause a denial of service (REQUIRE assertion failure and daemon exit) via a crafted packet, as demonstrated by an attack against named, dig, or delv.

РелизСтатусПримечание
devel

not-affected

1:9.9.5.dfsg-4
esm-infra-legacy/trusty

not-affected

lucid

not-affected

precise

not-affected

saucy

not-affected

trusty

not-affected

trusty/esm

not-affected

upstream

released

9.10.0-P2

Показывать по

EPSS

Процентиль: 96%
0.29819
Средний

5 Medium

CVSS2

Связанные уязвимости

redhat
около 11 лет назад

libdns in ISC BIND 9.10.0 before P2 does not properly handle EDNS options, which allows remote attackers to cause a denial of service (REQUIRE assertion failure and daemon exit) via a crafted packet, as demonstrated by an attack against named, dig, or delv.

nvd
около 11 лет назад

libdns in ISC BIND 9.10.0 before P2 does not properly handle EDNS options, which allows remote attackers to cause a denial of service (REQUIRE assertion failure and daemon exit) via a crafted packet, as demonstrated by an attack against named, dig, or delv.

debian
около 11 лет назад

libdns in ISC BIND 9.10.0 before P2 does not properly handle EDNS opti ...

github
около 3 лет назад

libdns in ISC BIND 9.10.0 before P2 does not properly handle EDNS options, which allows remote attackers to cause a denial of service (REQUIRE assertion failure and daemon exit) via a crafted packet, as demonstrated by an attack against named, dig, or delv.

fstec
около 11 лет назад

Уязвимость программного обеспечения BIND Server, позволяющая удаленному злоумышленнику нарушить доступность защищаемой информации

EPSS

Процентиль: 96%
0.29819
Средний

5 Medium

CVSS2