bind vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the https://ftp.isc.org|bind package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Denial of Service (DoS)

[,9.18.28)[9.19.0,9.20.0)
  • H
Denial of Service (DoS)

[,9.18.28)[9.19.0,9.20.0)
  • H
Denial of Service (DoS)

[,9.18.28)[9.19.0,9.20.0)
  • H
Denial of Service (DoS)

[9.18.1,9.18.28)[9.19.0,9.20.0)
  • H
Inefficient Algorithmic Complexity

[,9.16.48)[9.18.0,9.18.24)[9.19.0,9.19.21)
  • H
Reachable Assertion

[9.12.0,9.16.48)[9.18.0,9.18.24)[9.19.0,9.19.21)
  • H
Denial of Service (DoS)

[,9.16.48)[9.18.0,9.18.24)[9.19.0,9.19.21)
  • M
Allocation of Resources Without Limits or Throttling

[0,)
  • H
Allocation of Resources Without Limits or Throttling

[,9.16.45)
  • H
Allocation of Resources Without Limits or Throttling

[9.0.0,9.16.48)[9.18.0,9.18.24)[9.19.0,9.19.21)
  • H
Allocation of Resources Without Limits or Throttling

[9.0.0,9.16.48)[9.18.0,9.18.24)[9.19.0,9.19.21)
  • H
Denial of Service (DoS)

[9.18.0,9.18.7)[9.19.0,9.19.5)
  • M
Denial of Service (DoS)

[9.0.0,9.16.33)[9.9.3-S1,9.11.37-S1)[9.16.8-S1,9.16.33-S1)[9.18.0,9.18.7)[9.19.0,9.19.5)
  • H
Denial of Service (DoS)

[9.8.4,9.16.33)(9.9.4-S1,9.11.37-S1)(9.16.8-S1,9.16.33-S1)
  • M
Buffer Over-read

[9.18.0,9.18.7)[9.19.0,9.19.5)
  • M
Denial of Service (DoS)

[9.11.4-S1,9.16.33-S1)[9.9.12,9.16.33)[9.18.0,9.18.7)[9.19.0,9.19.5)
  • H
Denial of Service (DoS)

[9.16.14-S1,16.33-S1)[9.16.14,9.16.33)[9.18.0,9.18.7)[9.19.0,9.19.5)
  • M
Denial of Service (DoS)

[,9.16.27)[9.17.0,9.18.1)
  • M
Improper Input Validation

[,9.11.37)[9.12.0,9.16.27)[9.17.0,9.18.1)
  • H
Denial of Service (DoS)

[,9.18.1)
  • M
Improper Input Validation

[,9.4.3)[9.5.0,9.5.2)[9.6.0,9.6.1)
  • M
Race Condition

[,9.9.1)
  • H
Information Exposure

[0,)
  • M
Access Restriction Bypass

[,9.6.2)[9.7.0,9.7.2)
  • M
Improper Input Validation

[,9.9.7)[9.10.0,9.10.3)
  • H
Improper Input Validation

[9.3.5,9.5.0]
  • L
Improper Data Handling

[,9.7.1]
  • H
Improper Input Validation

[0,9.10.3-P3)
  • M
Resource Management Errors

[,9.9.7)[9.10.0,9.10.2)
  • H
Denial of Service (DoS)

[9.0.0,9.9.9)[9.10.0,9.10.4)
  • H
Denial of Service (DoS)

[,9.4.0]
  • M
Denial of Service (DoS)

[9.0,9.3.2]
  • M
Denial of Service (DoS)

[,9.4.1)
  • H
Code

[,9.9.7-P1)[9.10.22,9.10.2-P2)
  • M
Race Condition

[9.11.0,9.11.8)[9.12.0,9.12.4-P2)[9.13.0,9.14.3)[9.15.0,9.15.1)
  • M
Use of a Risky Cryptographic Algorithm

[9.9.0,9.10.8)[9.11.0,9.11.5)[9.12.0,9.12.3)[9.13.0,9.13.7)
  • H
Improper Input Validation

[,9.9.9-P8)[9.10.48,9.10.4-P8)[9.11.05,9.11.0-P5)
  • M
Improper Input Validation

[,9.9.8-P4)[9.9.86,9.9.8-S6)[9.10.34,9.10.3-P4)
  • M
Denial of Service (DoS)

[,9.2.6)[9.3.0,9.3.2)
  • M
Improper Input Validation

[9.0,9.9.9)[9.10.0,9.10.4)
  • H
Out-of-Bounds

[,9.8.4)[9.8.0,9.8.5b2)[9.9.0,9.9.2)[9.9.0,9.9.3b2)
  • M
Denial of Service (DoS)

[9.11.0,9.11.2)
  • H
Denial of Service (DoS)

[9.11.7,9.11.14)[9.14.1,9.14.8)[9.15.0,9.15.6)
  • M
Denial of Service (DoS)

[,9.2.6)[9.3.0,9.3.2)
  • M
Improper Authentication

[,9.6.1)
  • M
CVE-2001-0497

[,9.1.3)
  • M
Denial of Service (DoS)

[9.8.0,9.8.9)[9.9.0,9.9.10)[9.10.0,9.10.5)
  • H
CVE-2010-0382

[,9.4.3)[9.5.0,9.5.2)[9.6.0,9.6.1)
  • M
Improper Input Validation

[0,9.10.0-P1)
  • H
Denial of Service (DoS)

[,9.7.6)[9.8.0,9.8.3)[9.9.0,9.9.1)
  • M
Denial of Service (DoS)

[,9.2.1)
  • H
Insufficient Verification of Data Authenticity

[9.14.0,9.14.7)[9.15.0,9.15.5)
  • H
Denial of Service (DoS)

[9.15.6,9.16.6)[9.17.0,9.17.4)
  • H
Denial of Service (DoS)

[,9.6-ESV-R9-P1)[9.8.51,9.8.5-P1)[9.9.31,9.9.3-P1)
  • M
Denial of Service (DoS)

[9.0.0,9.11.22)[9.12.0,9.16.6)[9.17.0,9.17.4)
  • H
Denial of Service (DoS)

[9.12.0,9.12.4-P1)[9.13.0,9.14.1)
  • H
Denial of Service (DoS)

[9.3.0,9.5.0]
  • M
Denial of Service (DoS)

[9.16.0,9.16.4)
  • M
Improper Data Handling

[0,9.3.4-1.fc5)
  • H
Denial of Service (DoS)

[,9.7.6)[9.8.0,9.8.3)[9.9.0,9.9.1)
  • H
Resource Management Errors

[,9.9.6-P1)[9.10.11,9.10.1-P1)
  • M
Improper Input Validation

[9.8.0,9.9.2]
  • H
Improper Input Validation

[,9.9.10)
  • H
Improper Input Validation

[,9.9.7)[9.10.0,9.10.3)
  • H
Improper Input Validation

[,9.7.6)[9.8.0,9.8.3)[9.9.0,9.9.1)
  • M
Race Condition

[,9.9.8-P2)[9.10.32,9.10.3-P2)
  • M
NULL Pointer Dereference

[9.9.3,9.11.1]
  • H
Privilege Escalation

[9.10.0,9.11.22)[9.12.1,9.16.6)[9.17.0,9.17.4)
  • H
Denial of Service (DoS)

[9.14.0,9.14.7)[9.15.0,9.15.5)
  • M
Access Restriction Bypass

[,9.7.2]
  • M
Information Exposure

[9.9.0,9.10.8)[9.11.0,9.11.5)[9.12.0,9.12.3)[9.13.0,9.13.7)
  • H
Improper Input Validation

[,9.8.4)[9.9.0,9.9.2)
  • M
Error Handling

[9.9.8,9.11.0]
  • C
Denial of Service (DoS)

[9.0.0,9.11.31)[9.12.0,9.16.15)[9.17.0,9.17.12)
  • L
Improper Input Validation

[9.4.0,9.8.9)[9.9.0,9.9.11)[9.10.0,9.10.6)[9.11.0,9.11.2)
  • M
Denial of Service (DoS)

[9.12.0,9.12.1-P1)
  • H
Denial of Service (DoS)

[9.7.0,9.8.8)[9.9.0,9.9.13)[9.10.0,9.10.8)[9.11.0,9.11.4)[9.12.0,9.12.2)[9.13.0,9.13.2)
  • M
Improper Authentication

[9.0.0,9.6.0]
  • H
Denial of Service (DoS)

[,9.17.2)
  • M
Improper Input Validation

[0,9.10.1-P1)
  • M
CVE-2012-1033

[9.0,9.8.1]
  • M
Privilege Escalation

[9.9.12,9.10.0)[9.10.7,9.11.0)[9.11.3,9.11.22)[9.12.1,9.16.6)[9.17.0,9.17.4)
  • M
Improper Input Validation

[0,9.10.0-P2)
  • H
Denial of Service (DoS)

[9.7.0,9.9.3]
  • M
Cross-site Scripting (XSS)

[,9.4.3)[9.5.0,9.5.1)[9.6.0,9.6.1)
  • H
Memory Leak

[9.10.7,9.10.8)[9.11.3,9.11.5)[9.12.0,9.12.3)[9.13.0,9.13.6)
  • H
Denial of Service (DoS)

[9.0.0,9.11.31)[9.12.0,9.16.15)[9.17.0,9.17.12)
  • M
Access Restriction Bypass

[,9.7.2]
  • M
Denial of Service (DoS)

[,9.7.3)
  • M
Improper Input Validation

[,9.7.3)
  • C
Denial of Service (DoS)

[,9.4.3)
  • M
CVE-2007-2926

[9.0,9.5.0]
  • M
Denial of Service (DoS)

[9.8.5,9.8.9)[9.9.3,9.11.31)[9.12.0,9.16.15)[9.17.0,9.17.12)
  • H
Improper Input Validation

[,9.9.8-P4)[9.9.86,9.9.8-S6)[9.10.34,9.10.3-P4)
  • H
Denial of Service (DoS)

[9.9.0,9.11.6-P1)[9.12.0,9.12.4)[9.13.0,9.14.1)
  • M
Access Restriction Bypass

[,9.6-ESV-R10-P1)[9.8.61,9.8.6-P1)[9.9.41,9.9.4-P1)
  • H
Denial of Service (DoS)

[,9.7.6)[9.8.0,9.8.3)[9.9.0,9.9.1)
  • H
Improper Input Validation

[9.1,9.9.2]
  • H
Improper Input Validation

[9.0,9.9.9)[9.10.0,9.10.4)
  • M
Improper Input Validation

[0,9.10.3-P4)
  • H
Improper Input Validation

[,9.9.9)[9.10.0,9.10.4)
  • M
Improper Input Validation

[,9.4.3)[9.5.0,9.5.2)[9.6.0,9.6.1)
  • M
Resource Management Errors

[9.7.1,9.7.2]
  • M
Denial of Service (DoS)

[9.4.0,9.5.0]
  • M
CVE-1999-0184

[,9.4.0]
  • M
Denial of Service (DoS)

[,9.7.3)
  • M
Improper Input Validation

[,9.9.8-P2)[9.10.32,9.10.3-P2)
  • H
Denial of Service (DoS)

[,9.17.2)
  • M
Improper Access Control

[9.4.0,9.8.9)[9.9.0,9.9.11)[9.10.0,9.10.6)[9.11.0,9.11.2)
  • H
Use After Free

[9.4.0,9.8.9)[9.9.0,9.9.12)[9.10.0,9.10.7)[9.11.0,9.11.3)
  • L
Denial of Service (DoS)

[9.8.0,9.8.1]
  • L
Improper Input Validation

[,9.4.3)[9.5.0,9.5.2)[9.6.0,9.6.1)[9.7.0,9.7.0b3)
  • H
Improper Input Validation

[9.14.0,9.16.6)[9.17.0,9.17.4)
  • H
Denial of Service (DoS)

[,9.16.20)[9.16.201,9.16.20-S1)[9.17.0,9.17.17)
  • H
Improper Input Validation

[0,9.12.1-P2)
  • M
Improper Input Validation

[,9.9.9-P8)[9.10.48,9.10.4-P8)[9.11.05,9.11.0-P5)
  • M
Denial of Service (DoS)

[9.11.14-s1,9.0.0)[9.11.14,9.11.20)[9.14.9,9.15.0)[9.16.0,9.16.4)
  • L
Out-of-Bounds

[,9.6-esv-r10-p2)[9.8.62,9.8.6-p2)[9.9.42,9.9.4-p2)
  • M
Denial of Service (DoS)

[,9.3.0]
  • M
Incorrect Authorization

[,9.11.5)[9.12.0,9.12.3)
  • M
Resource Management Errors

[,9.8.0)
  • M
Insecure Randomness

[,9.5.0)
  • M
Improper Input Validation

[,9.6.2)[9.7.0,9.7.2)
  • H
Access Restriction Bypass

[,9.12.0)
  • M
Improper Input Validation

[9.0,9.9.9)[9.10.0,9.10.4)
  • M
Denial of Service (DoS)

[9.0,9.9.0]
  • H
Improper Data Handling

[,9.9.7)[9.10.0,9.10.3)
  • M
Access Restriction Bypass

[9.4.0,9.5.0]
  • H
Buffer Overflow

[9.5.0,9.11.28)[9.12.0,9.16.12)
  • M
Improper Input Validation

[,9.9.8-P3)[9.10.33,9.10.3-P3)
  • H
CVE-2019-6470

[0,4.4.1)
  • M
User Impersonation

[9.8.0,9.9.1)